Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

London is the center of tech startups in Europe. So, how will the U.K.'s separation from the EU impact the tech sector?

MIRCOP ransomware blames victim for attack, demands $28K ransom

MIRCOP ransomware blames victim for attack, demands $28K ransom

The MIRCOP ransomware campaign is taking several highly unusual steps with the criminals asking for an exorbitantly high ransom and refusing to tell the victim how to make the payment.

CYBERCOM 'reluctant' to cut off Islamic State internet

CYBERCOM 'reluctant' to cut off Islamic State internet

The US Cyber Command is hesitant to shut down the Islamic State's online capability, and with apparently good reason

Chinese tech professional caught selling secrets

Chinese tech professional caught selling secrets

In the ongoing saga of Chinese-American economic espionage, a Chinese ex-IBM employee has been arrested for trying to sell source code and trade secrets to the Chinese government.

How 154M U.S. voter records will affect Americans' security - industry reacts

How 154M U.S. voter records will affect Americans' security - industry reacts

An unencrypted database was discovered containing 154 million records of U.S. voters, including addresses, phone numbers, political party, income range, ethnicity, age, and voting history.

DDoS it matter what motivates Lizard Squad?

DDoS it matter what motivates Lizard Squad?

Lizard Squad is best known for launching DDoS attacks against Microsoft Xbox Live and Sony PlayStation Network, and doing so 'for the lulz!' SC Magazine UK has been pondering whether the motivation actually matters?

Many IT pros are still not sure what the EU GDPR means to them

Many IT pros are still not sure what the EU GDPR means to them

Many IT professionals are still unaware of what the EU GDPR means to their organisation with 20 percent being oblivious to the possibility that a data breach could lead to fines of up to €30m (£23m) or four percent of annual turnover.

Ransomware attack almost sends NASCAR team to the garage

Ransomware attack almost sends NASCAR team to the garage

Circle-Sport Leavine Family Racing (CSLFR) was rear-ended by a ransomware attack in April forcing the team to fork over about $600 to regain access to essential team records.

Dangerous connections: Risky LinkedIn behavior runs rampant, finds survey

Dangerous connections: Risky LinkedIn behavior runs rampant, finds survey

New research on LinkedIn and social media habits shows that many users are guilty of indiscriminately connecting with online strangers, potentially opening them up to spear phishing schemes and business email compromise scams.

Shoddy server configuration gives researchers glimpse into PunkeyPOS

Shoddy server configuration gives researchers glimpse into PunkeyPOS

PandaLabs was able to work around the password to access the server controlling PunkeyPOS without credentials because the bad guys didn't properly configure it, the researchers said.

Nuclear EK drops out of sight: Check Point

Nuclear EK drops out of sight: Check Point

Researchers at Check Point are taking credit for knocking the Nuclear Exploit Kit out of use, but another security company is questioning whether Check Point should have kept its knowledge under wraps to not tip off the bad guys.

Carbonite resets passwords after attackers target user accounts

Carbonite resets passwords after attackers target user accounts

Carbonite announced a forced password reset after the online backup provider discovered attackers attempting to access its user accounts.

Severe flaws detected in popular compression library

Severe flaws detected in popular compression library

Patches have been made available for programming errors found in libarchive that could make software used in a number of platforms vulnerable to exploitation.

Pen testers discover mega vulnerabilities in Uber

Pen testers discover mega vulnerabilities in Uber

Portuguese pen testing team discover 14 flaws in Uber apps which would have enabled them to get free rides and disclose details of passengers' and drivers' journeys.

Brexit: London Mayor allies with tech industries to urge U.K. remain

Brexit: London Mayor allies with tech industries to urge U.K. remain

The mayor of London, along with representatives from the tech industry, lobbied for a Remain vote.

Conficker tops ranking of most common malware family

Conficker tops ranking of most common malware family

Conficker maintains its rank as the most common malware family, according to Check Point's May 2016 Threat Index.

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.

Cyber Command getting on the job training fighting ISIS

Cyber Command getting on the job training fighting ISIS

U.S. Cyber Command is finding the day-in and day-out operations it is conducting in support of U.S, and allied forces fighting ISIS is giving the cyber troops a massive amount of on the job training.

Senate fails to pass amendment expanding FBI's NSL authority, codifying lone wolf provision

Senate fails to pass amendment expanding FBI's NSL authority, codifying lone wolf provision

An amendment to the "Commerce, Justice, Science and Related Agencies Appropriations Act," which would expand the FBI's NSL authority failed to pass the Senate Wednesday.

Apple reveals potential iOS security flaws in unencrypted kernel release

Apple reveals potential iOS security flaws in unencrypted kernel release

Apple has released an unencrypted version of its latest operating system for iOS 10, giving security researchers an unprecedented opportunity to scour the kernel for security flaws.

Updated coin mining malware spotted using an iFrame as the infection vector

Updated coin mining malware spotted using an iFrame as the infection vector

Several FireEye Labs researchers have uncovered a new methodology being used by criminals utilizing coin mining malware where the infection vector is an HTML document embedded inside another HTML document.

Clinton Foundation possibly breached by Russian hackers who targeted DNC

Clinton Foundation possibly breached by Russian hackers who targeted DNC

Russian hacking groups may have broken into the Bill, Hillary and Chelsea Clinton Foundation, though the organization has not confirmed those assertions, reports said.

Researchers ID Brazilian banking Trojan creator

Researchers ID Brazilian banking Trojan creator

Security researchers discovered a new family of malware sold as a banking-Trojan-as-a-service. The cybercriminal rents the banking Trojan for about $600 per 10-day period.

Dial M for malware: 'Pawost' trojan hijacks Android phones to make unauthorized calls

Dial M for malware: 'Pawost' trojan hijacks Android phones to make unauthorized calls

A recently discovered mobile malware program is giving Android devices a mind of their own, causing them to use Google Talk to secretly and repeatedly place outgoing calls to mysterious phone numbers approximately every two minutes.

Ransomware awareness and fear growing: Study

Ransomware awareness and fear growing: Study

When faced with a situation where a firm's critical data has been locked up by a ransomware attack and irretrievable by backup, close to half of the companies surveyed by KnowBe4 for its latest ransomware survey said they would pay the ransom to get their systems back online.

Justice's Caldwell lauds Rule 41 changes, EFF, other orgs start campaign to thwart

Justice's Caldwell lauds Rule 41 changes, EFF, other orgs start campaign to thwart

Assistant AG Leslie Caldwell said amendments to Rule 41 don't run counter to the Fourth Amendment, while the EFF and other groups mobilized web operators and citizens to oppose the changes set to take affect December 16.

China cyber incursions drop, but more focused, report

China cyber incursions drop, but more focused, report

A new study from FireEye finds that while Chinese cyber attacks have declined, they are now "more focused, calculated, and still successful in compromising corporate networks."

GoToMyPC, but not until you reset your password

GoToMyPC, but not until you reset your password

Unfortunately, the GoToMYPC service has been targeted by a 'very sophisticated password attack', says GoToMYPC

Check Point tracks two waves of Cerber ransomware hitting U.S., UK

Check Point tracks two waves of Cerber ransomware hitting U.S., UK

A team of Check Point researchers have tracked two large waves of attacks using Cerber ransomware in the last few months with more spikes in the number of incidents expected.

Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows

Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows

A comparative analysis by Fidelis Cybersecurity of malware samples provided by the DNC supported findings by CrowdStrike that a pair of intrusions were the handiwork of the Cozy Bear and Fancy Bear APT groups purported to have ties to Russian intelligence.

Acer breach caused by improperly stored data

Acer breach caused by improperly stored data

Acer reported a security breach compromised the sensitive data of nearly 34,500 online shoppers.

Clarke: Military may be falling short in protecting weapons systems from cyberattacks

Clarke: Military may be falling short in protecting weapons systems from cyberattacks

The U.S. military may not be doing enough to protect its weapons systems from cyberattacks, former National Security Council (NSC) Cybersecurity Director Richard Clarke said during a recent conference.

'Password attacks' continue; Citrix becomes latest victim

'Password attacks' continue; Citrix becomes latest victim

Hackers used login information to launch a "sophisticated password attack" to login to Citrix's GoToMyPC user accounts, according to a company blog post.

RSF presses for whistleblower protections in 'Sapin 2' bill

RSF presses for whistleblower protections in 'Sapin 2' bill

Reporters Without Borders (RSF) has asked French senators to bolster the Sapin 2 bill's protections and address its flaws.

Microsoft unveils "Project Bletchley" secure blockchain framework

Microsoft unveils "Project Bletchley" secure blockchain framework

Project Bletchley has been introduced by Microsoft and will use blockchain to secure financial transaction history and protect against fraud

House votes down warrantless surveillance ban following Orlando shootings

House votes down warrantless surveillance ban following Orlando shootings

The House voted against an amendment to a military spending bill that would have required law enforcement agencies to attain a warrant in order to search the electronic communications of Americans.

Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT

Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT

At the Gartner Security & Risk Management Summit outside of Washington, D.C., this week, the firm revealed its top-10 list of information security technologies that are trending in 2016.

New RAA ransomware written in JavaScript discovered

New RAA ransomware written in JavaScript discovered

A new variety of ransomware called RAA has been discovered that has the somewhat unusual attribution of being coded in JavaScript instead of one of the more standard programming languages making it more effective in certain situations.

'Hidden' data found in 92% of interactions with UK companies

'Hidden' data found in 92% of interactions with UK companies

Ground Labs has identified tonnes of data left lying around, and many UK organisations are unaware of what that means for the incoming GDPR

Access to 70,000 hacked servers sold on hacker marketplace; industry reacts

Access to 70,000 hacked servers sold on hacker marketplace; industry reacts

Researchers discover a hacker marketplace on the Dark Web selling access to more than 70,000 hacked computer servers.

Ransomware distributors evolving their delivery strategies

Ransomware distributors evolving their delivery strategies

Developers behind the Nemucod downloader are working diligently to avoid detection.

Beyond encryption: researchers detail what makes ransomware tic

Beyond encryption: researchers detail what makes ransomware tic

As ransomware grows in popularity, TrendMicro researchers examined some of the tactics and techniques beyond encryption that enable the file locking malware to work.

Adobe patches critical zero-day vulnerability in Flash Player

Adobe patches critical zero-day vulnerability in Flash Player

Adobe released a Flash Player update containing patches for 36 vulnerabilities, including the zero-day CVE-2016-4171, a critical issue that was called out earlier this week as having been spotted hitting targets in the wild.

Russian police to target credit-card credential thieves

Russian police to target credit-card credential thieves

Russia is planning to find ways to fight cyber-criminals specialising in the theft of bank-card personal data.

Cyberattack on NATO could trigger a military response

Cyberattack on NATO could trigger a military response

A cyberattack on a NATO member could result in a conventional military response by the defense organization, NATO Secretary General Jens Stoltenberg said.

Siemens update advised following US CERT advisory

Siemens update advised following US CERT advisory

Updates are available following US Computer Emergency Response Team (CERT) issuing advisory warning of "weakly protected" credentials in Siemens SIMATIC WinCC flexible industrial control system.

Private sector execs praise Cybersecurity Act during House hearing

Private sector execs praise Cybersecurity Act during House hearing

Private sector executives praised the information-sharing implementation of the Cybersecurity Act of 2015 during a House subcommittee hearing on Wednesday.

Newly discovered malware campaign adds to TeamViewer's account hijacking woes

Newly discovered malware campaign adds to TeamViewer's account hijacking woes

TeamViewer continues to assert that poor password management is the chief cause behind a spate of user account hijackings, but a new alert from Trend Micro suggests that a malware campaign could be another piece to the puzzle.

Ponemon puts a $4 million price tag placed on mitigating data breaches

Ponemon puts a $4 million price tag placed on mitigating data breaches

Companies hit with a data breach will spend on average $4 million in 2016 to mitigate the problem with many firms exacerbating their costs by not following a few basic rules, like creating an incident response team, according to a new Ponemom/IBM study.

OSGP update doesn't use RC4 encryption that researchers say vulnerable to attack

OSGP update doesn't use RC4 encryption that researchers say vulnerable to attack

While the Open Smart Grid Protocol's (OSGP) newest security suite that doesn't incorporate the vulnerable RC4 encryption method, known weaknesses in RC4 used in earlier generation OSGP devices, could "be exploited to successfully to attack the OSGP implementation as well."

Leakedsource.com finds 45M leaked VerticalScope user records

Leakedsource.com finds 45M leaked VerticalScope user records

The outdoor and motorsports-centric website aggregator VerticalScope was hacked according to an industry watchdog with about 45 million records from more than 1,100 websites being taken and posted to the internet.

Adobe issues Flash Player advisory, Patch Tuesday updates

Adobe issues Flash Player advisory, Patch Tuesday updates

Adobe issued a security advisory for CVE-2016-4171 critical vulnerability in Flash Player that is being exploited in the wild today along with four security bulletins for other company products.

IT pros are not sure how to properly secure their IoT devices

IT pros are not sure how to properly secure their IoT devices

While most IT professionals acknowledge the growing amount of IoT devices on their networks, they are unaware of how to properly secure them.

DOJ report finds local police sought surveillance tech to blackmail city council

DOJ report finds local police sought surveillance tech to blackmail city council

As local law enforcement agencies increase efforts to make use of powerful surveillance technologies, the DOJ has issued a harsh report detailing a pattern of misconduct and corruption at the Calexico Police Department.

Twitter, HealthCare.gov top annual list of most trustworthy websites

Twitter, HealthCare.gov top annual list of most trustworthy websites

At one time ridiculed over lax cybersecurity, the federal health insurance exchange site HealthCare.gov scored second-highest out of approximately 1,000 websites in the Online Trust Alliance's eighth annual Trust Audit and Honor Roll.

Russian hackers access Trump files in DNC hack

Russian hackers access Trump files in DNC hack

Russian government hackers apparently broke into the Democratic National Committee (DNC) computer system and accessed the party's entire database on Republican candidate Donald Trump.

Microsoft acquisition of LinkedIn raises privacy questions

Microsoft acquisition of LinkedIn raises privacy questions

While Microsoft's $26.2 billion acquisition of data-rich LinkedIn will enhance business, the company has not yet said how it plans to protect the privacy of personal data of LinkedIn members.

Survey: 66% of IT pros think their companies' cyberincident response plans are ineffective

Survey: 66% of IT pros think their companies' cyberincident response plans are ineffective

Companies are failing to develop, update and execute successful incident response plans in the event of a damaging cyberattack, a new white paper from AT&T Business warns.

Russian banker trojan 'Lurk' flies under radar, picked up by researchers

Russian banker trojan 'Lurk' flies under radar, picked up by researchers

Kaspersky Lab researchers spotted a unique Russian banker trojan, dubbed "Lurk" targeting various industries.

FLocker ransomware now targeting Smart TVs

FLocker ransomware now targeting Smart TVs

Having a favorite character killed off on "The Walking Dead" may no longer be the worst thing that can happen while watching TV as Trend Micro researchers have found the first major example of ransomware that can attack a Smart TV with hackers using an updated version of FLocker that targets devices running the Android operating system.

Ipswitch survey says 'intelligent' systems already affecting business

Ipswitch survey says 'intelligent' systems already affecting business

Security company Ipswitch has released new research which has shown that intelligent systems are coming fast but businesses are ill equipped to protect themselves from them.

New device can allegedly clone 15 contactless bank cards a second

New device can allegedly clone 15 contactless bank cards a second

The Daily Star newspaper is reporting that a new device has surfaced online which has the ability to clone 15 contactless bank cards a second.

For sale: 51M iMesh user accounts

For sale: 51M iMesh user accounts

A database of user accounts of the once popular video and music-sharing site iMesh has been made available on the dark web.

Intel looks at stopping hackers and malware at the processor level

Intel looks at stopping hackers and malware at the processor level

Plans are being hatched to prevent return-oriented programming attacks on memory flaws

Windows zero day devalued as supply and demand takes hold, experts speculate

Windows zero day devalued as supply and demand takes hold, experts speculate

Market forces are beginning to have an effect on zero days, evidenced by a new drop in the price of a significant zero-day.

Gamers looking for freebies hit with PUAs through torrent downloads

Gamers looking for freebies hit with PUAs through torrent downloads

Karma may be getting even with gamers who believe they are downloading free computer games illegally on torrent, when in fact the file obtained is not a game, but a potentially unwanted application (PUA).

Vawtrak malware updated to break tools used by researchers

Vawtrak malware updated to break tools used by researchers

A new version of banking malware includes updates that break tools typically used by security researchers to analyze the Vawtrak trojan.

Wendy's POS breach 'considerably' bigger than first thought

Wendy's POS breach 'considerably' bigger than first thought

Even more fast-food patrons may have a beef with The Wendy's Company, after the restaurant chain announced yesterday that the number of restaurants affected by a POS data breach may be "considerably higher" than first thought.

FBI creating an automated tattoo recognition project

The EFF has sounded an alarm over a joint project between the FBI and the National Institute of Standards and Technology (NIST) to develop automated tattoo recognition technologies.

Cyber gang offering live chat help for its ransomware victims

Cyber gang offering live chat help for its ransomware victims

"Hello, this is Ransomware Depot. How may I help you?"

Hackers shift to Neutrino exploit kit to spread CryptXXX ransomware

Hackers shift to Neutrino exploit kit to spread CryptXXX ransomware

Change of tactics from cyber-criminals may be an attempt to bypass signature detection and improve infection performance.

Researchers find exploit affecting Microsoft's BITS

Researchers find exploit affecting Microsoft's BITS

Researchers discovered an exploit against Background Intelligent Transfer Service, a component of Microsoft's Windows 2000 that is used to transfer files asynchronously between a client and a server.

Sen. Lee pulls electronic privacy legislation to shield it from controversial amendment

Sen. Lee pulls electronic privacy legislation to shield it from controversial amendment

Sen. Mike Lee (R-Utah), one of the original sponsors of the ECPA Amendments Act of 2015, withdrew the bill today from the Senate Judiciary Committee after a proposed amendment threatened to defeat one of its key tenets.

Report finds millions of firewall ports left open unnecessarily

Report finds millions of firewall ports left open unnecessarily

A survey of all the ports on the internet is designed to provide decision-makers with the statistical information they need to make informed decisions on engineering the internet - and reveals many, many are open to hackers.

Mozilla's Firefox 47 patches 13 vulnerabilities, two critical

Mozilla's Firefox 47 patches 13 vulnerabilities, two critical

In its latest Firefox browser release, Mozilla this week fixed two critical vulnerabilities - a buffer overflow hazard and a set of memory safety hazards - plus 11 other security holes ranging from low to high in severity.

UK Parliament passes Investigatory Powers Bill

UK Parliament passes Investigatory Powers Bill

Most MPs in the UK House of Commons have agreed to pass the Investigatory Powers Bill, in a vote of 444-69 in favour, most Labour MPs who had appeared to be against the bill voted in favour of it.

InfoSec 2016: EU GDPR - Don't panic, prioritise - and do the right thing for your customers

InfoSec 2016: EU GDPR - Don't panic, prioritise - and do the right thing for your customers

Don't panic, prioritise and plan for EU GDPR - and if you do the right thing for your customer, the chances are you will be compliant and avoid potentially hefty fines for data breach.

InfoSec 2016: 3/4 experts agree working together crucial to incident response

InfoSec 2016: 3/4 experts agree working together crucial to incident response

A group of industry experts joined for a panel to discuss enterprise-wide cyber-incident response plans and proactive techniques for a rapid response and three of the four panellists agreed it's all about the people.

Black-Hat uses SQL injection to your site to boost their SEO ranking

Black-Hat uses SQL injection to your site to boost their SEO ranking

Instead of stealing your data, a criminal-run bot-net is using SQL injection to insert hidden links to boost the SEO of their own dodgey sites.

Tessa88 hacker continues rampage, puts Twitter account info up for sale

Tessa88 hacker continues rampage, puts Twitter account info up for sale

Already linked to the LinkedIn, Myspace, Tumblr and VK.com breaches, Russian hacker Tessa88 earlier this week claimed access to 379 million Twitter accounts, reportedly offering to sell the leaked database for 10 bitcoins.

Report: DDoS attacks can comprise up to 10% of a country's total Internet traffic

Report: DDoS attacks can comprise up to 10% of a country's total Internet traffic

In periods of peak activity, DDoS attacks can comprise as much as 10 percent of a country's total Internet traffic as they are transpiring, according to Cisco Systems' 2016 Visual Networking Index report.

Flaw in Juniper's JunOS router software could cause DDoS flood

Flaw in Juniper's JunOS router software could cause DDoS flood

Juniper has disclosed that that a problem with the Junos router could enable DDoS attacks

New macros attacks use Anti-VM and Anti-Sandbox techniques

New macros attacks use Anti-VM and Anti-Sandbox techniques

Zscaler researchers spotted a new wave of macros docs using Anti-VM and Anti-Sandbox techniques.

Tech firms, civil liberty groups oppose email privacy amendment

Tech firms, civil liberty groups oppose email privacy amendment

Tech companies and privacy advocates are calling foul on a proposed amendment to an email privacy bill that that was originally intended to update the Electronic Communications Privacy Act (ECPA).

48% of UK businesses fail to back up company data at least once a day

48% of UK businesses fail to back up company data at least once a day

One in five medium to-large businesses in the UK don't have a plan of action in place in case of a ransomware attack. Almost half (48 percent) of British businesses are failing to back up their company data at least once a day.

75% of UK consumers won't do biz with a company that has been hacked

75% of UK consumers won't do biz with a company that has been hacked

Three quarters of UK consumers would stop doing business or cancel memberships with an organisation if it was hacked.

Sweet validation: Apple versus FBI

Sweet validation: Apple versus FBI

In nearly every great movement in history, there is a moment in which the proverbial tide turns. For CISOs trying to convince their higher-ups to invest in encryption and cybersecurity programs, that moment came when the FBI tried to force Apple to crack open an iPhone 5c used by one of the San Bernardino shooters. And Apple refused.

Fed directs banks to check for cyberattacks, shore up security after SWIFT hacks

Fed directs banks to check for cyberattacks, shore up security after SWIFT hacks

The Federal Reserve Bank issued a notice Tuesday telling banks to assess their cybersecurity postures and search for clues of cyberattacks by the group that pulled off an $81 million cyber heist from the Bangladesh Central Bank.

Google patches 36 critical-severity and high-severity flaws

Google patches 36 critical-severity and high-severity flaws

Google released its June update, patching eight critical-severity vulnerabilities and 28 high-severity vulnerabilities that affect its Nexus devices and devices manufactured by partners of Google's Android Open Source Project.

DoubleClick ad fraud campaign lures victims with promise of adult videos

DoubleClick ad fraud campaign lures victims with promise of adult videos

Malwarebytes researchers spotted yet another malvertising campaign using the promise of adult videos to pull users into a DoubleClick ad fraud scam.

Low-profile Crysis ransomware suddenly stealing the show

Low-profile Crysis ransomware suddenly stealing the show

Researchers at ESET have discovered that an under-the-radar ransomware known as Crysis has been silently and quickly gaining momentum, and is currently even more prevalent than Locky.

Facebook Messenger flaw fixed promptly

Facebook Messenger flaw fixed promptly

After Check Point notified Facebook of a flaw in its Facebook Online Chat & Messenger App earlier this month, the social media giant responded and quickly fixed the vulnerability.

InfoSec 2016: Mimecast says organisations unsure about cyber insurance

InfoSec 2016: Mimecast says organisations unsure about cyber insurance

Mimecast warns organisations relying on cyber insurance: your policies may not be fully up-to-date in covering new social engineering email attacks.

FireEye researchers observed 'Apple-like phishing domains' aimed at Chinese, U.K. users

FireEye researchers observed 'Apple-like phishing domains' aimed at Chinese, U.K. users

FireEye researchers observed phony Apple domains registered during the first quarter of 2016 used to execute phishing attacks against Apple iCloud users located in China and the U.K.

No business like breach business

No business like breach business

After every big data breach comes the Ghostbusters moment: Who you gonna call?

'Black Shades' ransomware taunts researchers in its source code

'Black Shades' ransomware taunts researchers in its source code

An independent security researcher discovered a ransomware called "Black Shades," which not only encrypts files but also taunts security researchers.

EU, U.S. sign data privacy umbrella agreement

EU, U.S. sign data privacy umbrella agreement

The data privacy umbrella will allow cooperation between the U.S. and Europe law enforcement agencies in transferring data during criminal and terrorism investigations.

Jacob Appelbaum steps down from Tor Project after sexual misconduct claims intensify

Jacob Appelbaum, a collaborator with Wikileaks and an outspoken activist for a secure internet resigned as a developer and activist at The Tor Project Saturday amid allegations of sexual harassment and misconduct.

Survey: 85 percent of senior security pros say more than half of IoT products are not secure

Survey: 85 percent of senior security pros say more than half of IoT products are not secure

The proportion of executives who continue to distrust IoT as a secure technology is overwhelming, if a new survey from research-oriented security service firm IOActive is any indication.

Wireless hack could result in Mitsubishi cars being stolen

Wireless hack could result in Mitsubishi cars being stolen

The alarm can be disabled and the battery drained, researchers claim

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US