Category: News
The European parliament voted on Wednesday to fine firms like Facebook, Google and Twitter up to 4 percent of their turnover if they persistently fail to remove extremist content within one hour of being asked to do so by authorities. …
Federal Communications Commission chairman Ajit Pai said on Wednesday he opposes China Mobile Ltd’s bid to provide U.S. telecommunications services, citing security risks, and said the commission will vote on whether to deny the company’s application in May. China Mobile …
The National Cyber Security Centre (NCSC), together with Wayra UK, has launched a national call for 10 startups to join its accelerator programme to develop the next generation of cyber security products. Since its launch in 2017, the government-funded NCSC Cyber Accelerator has …
The TajMahal spyware includes more than 80 distinct spy tools, and went undetected for five years. IT’S NOT EVERY day that security researchers discover a new state-sponsored hacking group. Even rarer is the emergence of one whose spyware has 80 distinct …
Researchers had already found a spyware app called Exodus plaguing Android. Now it has shown up on iPhones. PRIVATE COMPANIES AROUND the world have evolved a gray industry supplying digital surveillance and hacking tools to governments and local law enforcement. As the once …
Google has announced 30 new features or enhancements of its Google Cloud platform that are designed to improve the ability of organizations to manage security not only for the Google platform, but other cloud-based services and applications as well. “The …
For the past several years, an increasing number of cyberecrime groups have adopted techniques and procedures traditionally used by state-sponsored actors. This trend has caught many organizations unprepared, especially small and medium-sized businesses whose defenses are generally focused on regular …
First came small businesses, and now it’s election folks and journos up for cybersecurity toolkits. Also on deck for help: aspiring cyber pros who can swap federal service for scholarships. — A Senate panel today explores implementation of a law that …
The Chamois botnet once infected 20 million Android devices. Here’s how Google finally tore it up. IN MARCH 2017, the Android security team was feeling pleased with itself. The group had detected, analyzed, and neutralized a sophisticated botnet built on tainted apps …
GPS rollover this weekend — NATO launches live exercise next week MO’ MONEY, MO’ PROBLEM-SOLVERS — Cyberattacks represent “a significant challenge” that “exceeds the bandwidth that we have at the moment,” FBI Director Christopher Wray told House lawmakers Thursday during …
Almost exactly one year ago, KrebsOnSecurity reported that a mere two hours of searching revealed more than 100 Facebook groups with some 300,000 members openly advertising services to support all types of cybercrime, including spam, credit card fraud and identity …
BasBanke is a new Android malware family targeting Brazilian users. It is a banking Trojan built to steal financial data such as credentials and credit/debit card numbers, but not limited to this functionality. The propagation of this threat began during …
I’ve been in an IT career since 1987, starting as a PC troubleshooter and security consultant. Then I went on to be a trainer, network technician, network supervisor, director of networks and technology, VP of IT, principal security architect …
Russia’s communications watchdog threatened on Thursday to block access to popular VPN-services which allow users to gain access to websites which have been outlawed by Moscow. Russia’s communications watchdog threatened on Thursday to block access to popular VPN-services which allow …
Catch up on the most important tech news today in two minutes or less. Change your Facebook password. Facebook acknowledged a bug that caused hundreds of millions of user passwords (dating back to 2012) for both Facebook and Instagram to …
Security experts have been screaming at you for years to encrypt all network traffic. They have a point: Making a secure configuration the default configuration is an obviously good idea. Both the standards and products that implement encryption are very …
In this article, I want to demonstrate extracting the firmware from a secure USB device running on the Cortex M0. Who hacks video game consoles? The manufacture of counterfeit and unlicensed products is widespread in the world of video game …
Cybersecurity is a top concern for boards of directors. Don’t let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. In fact, 42% of the nearly 500 leaders surveyed …
A Norwegian aluminium producer has disclosed that it has come under cyber attack affecting several areas of its business as the firm faces claims of environmental damage One of the world’s largest aluminium producers, Norsk Hydro, has been hit by …
This is a story of how a career setback turned out to be a setup for something bigger. It was the year 2000, and I had just gone through a layoff. I was a network engineer and felt I needed …