security

Stealth Malware Targets Pyeongchang Olympics OrganisationsStealth Malware Targets Pyeongchang Olympics Organisations

Stealth Malware Targets Pyeongchang Olympics Organisations

Organisations in South Korea involved in organising this winter's Pyeongchang Olympics are being hit by a disguised malware campaign

7 years ago
US Customs Agents Now Need ‘Reasonable Suspicion’ To Copy DataUS Customs Agents Now Need ‘Reasonable Suspicion’ To Copy Data

US Customs Agents Now Need ‘Reasonable Suspicion’ To Copy Data

Officials at US border-crossing points such as airports now have new restrictions on when they can copy data from devices…

7 years ago
Opera 50 Browser Adds Bitcoin Mining ProtectionOpera 50 Browser Adds Bitcoin Mining Protection

Opera 50 Browser Adds Bitcoin Mining Protection

Opera uses ad-blocking tech to stop websites using your computer to mine for cryptocurrencies like Bitcoin

7 years ago
Meltdown & Spectre: Apple Confirms All Macs & iPhones Are Vulnerable To Chip BugMeltdown & Spectre: Apple Confirms All Macs & iPhones Are Vulnerable To Chip Bug

Meltdown & Spectre: Apple Confirms All Macs & iPhones Are Vulnerable To Chip Bug

Apple releases mitigations for Mac, iPhone and iPad and says a Safari fix is incoming as Meltdown and Spectre continue…

7 years ago
Data Privacy, Security Top Microsoft’s Hot Button Tech Issues In 2018Data Privacy, Security Top Microsoft’s Hot Button Tech Issues In 2018

Data Privacy, Security Top Microsoft’s Hot Button Tech Issues In 2018

Data privacy isn't only a top concern for Microsoft. It will go before the U.S. Supreme Court to argue the…

7 years ago
Meltdown & Spectre: Intel Chip Exploit Also Impacts ARM, AMD ChipsMeltdown & Spectre: Intel Chip Exploit Also Impacts ARM, AMD Chips

Meltdown & Spectre: Intel Chip Exploit Also Impacts ARM, AMD Chips

'Not just us' says Intel, as ARM and AMD are also said to be vulnerable to one of the flaws

7 years ago
Meltdown & Spectre: AWS, Azure & GCP Take Measures To Protect Cloud CustomersMeltdown & Spectre: AWS, Azure & GCP Take Measures To Protect Cloud Customers

Meltdown & Spectre: AWS, Azure & GCP Take Measures To Protect Cloud Customers

Public cloud vendors work to protect users from industry-wide Meltdown and Spectre chip vulnerabilities

7 years ago
Fix For Intel Chip Design Flaw Likely To Hurt PerformanceFix For Intel Chip Design Flaw Likely To Hurt Performance

Fix For Intel Chip Design Flaw Likely To Hurt Performance

Linux and Windows kernels to be redesigned because of Intel chip design flaw, but fix will likely slow PCs down

7 years ago
Login Managers Exploited By Third-Party Scripts To Capture User EmailsLogin Managers Exploited By Third-Party Scripts To Capture User Emails

Login Managers Exploited By Third-Party Scripts To Capture User Emails

Hidden scripts are capturing user email addresses from browsers' login or password managers

7 years ago
Apple Mac OS Zero-Day Flaw DisclosedApple Mac OS Zero-Day Flaw Disclosed

Apple Mac OS Zero-Day Flaw Disclosed

Mac users welcomed to new year with zero-day vulnerability in MacOS that has been open for over a decade

7 years ago
Data Breaches Shook Faith In Government, Ruined IT Careers in 2017Data Breaches Shook Faith In Government, Ruined IT Careers in 2017

Data Breaches Shook Faith In Government, Ruined IT Careers in 2017

ANALYSIS: Massive data breaches destroyed people's faith while it ruined the careers of senior IT executives anda reputations of giant…

7 years ago
China’s WeChat Denies Storing Users’ Data After Spying ClaimChina’s WeChat Denies Storing Users’ Data After Spying Claim

China’s WeChat Denies Storing Users’ Data After Spying Claim

The leading Chinese messaging app said it doesn't store users' chat history, after a top businessman said WeChat was 'watching'…

7 years ago
Smartphones ‘Can Be Unlocked’ Using Covert Sensor DataSmartphones ‘Can Be Unlocked’ Using Covert Sensor Data

Smartphones ‘Can Be Unlocked’ Using Covert Sensor Data

Singapore researchers used sensor information freely available to any mobile app to unlock Android phones in only three tries

7 years ago
Police Want To Use Amazon Echo To Solve CrimesPolice Want To Use Amazon Echo To Solve Crimes

Police Want To Use Amazon Echo To Solve Crimes

Lancashire Police are seeing how people could submit evidence and receive information about crimes using Amazon Echo

7 years ago
IT LIFE: Nico Fischbach, Forcepoint CTOIT LIFE: Nico Fischbach, Forcepoint CTO

IT LIFE: Nico Fischbach, Forcepoint CTO

Forcepoint's Global CTO Nico Fischbach discusses the future of security, his networking background and why he might open a restaurant

7 years ago

Mozilla Fixes Crash Data Leak Issue In Firefox Browser

The bug caused some versions of Firefox to automatically send crash reports to Mozilla's servers, without users' authorisation

7 years ago

Blockchain Expert Released By Kidnappers After Ransom Paid

Russian-born Pavel Lerner, a well-known cryptocurrency investor and entrepreneur, was kidnapped in Kiev on Boxing Day and has since been…

7 years ago

Malware Spreads Cryptocurrency Miner Via Facebook Messenger

The Digimine malware spreads through infected attachments in messages that may appear to come from someone the target knows

7 years ago

Government Looks For Tech To Support Prison Anti-Drone Squad

The specialist squad formed earlier this year aims to tackle the problem of drones being used to smuggle contraband into…

7 years ago

Edward Snowden Develops App For Monitoring Physical Security

The Android-based app monitors the physical environment around it and sends end-to-end encrypted updates via Signal mobile software

7 years ago

Last Minute Technology Christmas 2017 Gift Guide

Left it late this year? Here is our guide to the best Christmas tech gifts

7 years ago

Catelites Malware Targets Bank Customer Logins

Sophisticated fake mobile banking app interface for Android will steal your bank login credentials

7 years ago

US Blames North Korea For WannaCry Attack

United States now joins the UK in officially blaming North Korea for WannaCry ransomware attack

7 years ago

Newly Discovered Android Malware Physically Wrecks Phones

The Loapi malware, which poses as adult or security apps, runs processor-intensive scams that can cause a phone to overheat…

7 years ago

Kaspersky Lab Challenges US Government Security Ban

The DHS' September order prohibited Kaspersky Lab's products, including its popular antivirus, on civilian government networks

7 years ago

Thales Bids €4.76bn For Gemalto In Year’s Biggest Euro Tech Deal

Gemalto said it would back the offer from Thales, a week after the cybersecurity firm gave a lukewarm response to…

7 years ago

TRITON Attack Targeted Critical Infrastructure, Security Firm Says

FireEye warns that a nation-state appears to be infiltrating critical-infrastructure sites and developing ways to cause physical damage

7 years ago

Schools Are ‘Vulnerable’ To Heating Hacks

Building management system controllers connected to the Internet are a new source of vulnerability

7 years ago

Tech Quiz: Christmas Technology

Just like Cliff Richard said, "Christmas Time, mistletoe and... Wi-Fi"

7 years ago

1998 Vintage Cryptography Vulnerability Known As ROBOT Re-Emerges

The Cryptography vulnerability first detailed in 1998, still has the potential to impact modern websites

7 years ago