Tag : cybersecurity

Latest Posts

0 SHARES

Obama to Appoint Execs From Uber, Mastercard & Microsoft to Cybersecurity Panel

Cybersecurity is a big issue this year, with people becoming more and more aware of the steps that both governments and companies are making to gain access to or stop others accessing their data. After its…

0 SHARES

How Many Idiots Will Plug Random USB Drives into Their Computer?

You’d have to be stupid to pick up a random USB drive off the ground and connect it into your PC, right? If the answer is yes (which it is), then there’s a whole lot of…

0 SHARES

“Hack the Pentagon” Begins This Month

Hack the Pentagon, the US intelligence agency’s new bug bounty program, is set to begin this month, its organiser HackerOne has revealed. The challenge, which is open to anyone who thinks they have the technical nous…

0 SHARES

Racist Sends Print Jobs to Every Publicly Exposed Printer in the US

Many organizations in the US that rely on networked printers got a rude awakening last week when white supremacist troll and hacker Andrew “Weev” Auernheimer sent out an enormous batch print job to every unsecured network…

0 SHARES

John McAfee Wants China to Handle US Cybersecurity

Crackpot plutocrat and self-professed “cybersecurity legend” John McAfee believes that the US is doing such a terrible job of protecting its cybersecurity interests, and that it should outsource the task to a country better equipped at…

0 SHARES

One in Three Servers Affected by New TLS Decryption Hack

A new vulnerability has been discovered by security researchers that could be used to allow eavesdroppers to spy on the traffic between users and as many as one-in-three HTTPS servers. The problem arises due to the fact…

0 SHARES

IBM Acquire Resilient Systems and Gain Security Expert Bruce Schneier

IBM has announced today that they will be acquiring Resilient Systems and as well as the company, they will be bringing one of the biggest names in the security world on board, Bruce Schneier. Resilient Systems…

0 SHARES

Dell Announces Cloud Based BIOS Security

Dell has taken some flak recently due to some security issues found on their machines, which they were quick to fix. Now they are showing further dedication to improving the security of their business PCs and…

0 SHARES

Shodan Makes Snooping on Vulnerable Webcams Easy

Shodan is a search engine designed to allow users to search through information on devices that are connected to the internet. The site, named after the AI from the System Shock series of games has been around…

0 SHARES

Hyatt Hotels Hit by Hacker

Today Hyatt Hotels issued a warning to their visitors in the wake of a cache of malware being discovered on their customer payment system being discovered. This isn’t the first hotel chain to suffer security issues…

0 SHARES

Twitter Users Hit by State-Sponsored Attackers

On Friday, a number of Twitter users received a notification from the social networking platform, explaining that their accounts had been the target of state-sponsored actors. Unsurprisingly, the supposed targets of these attacks were mass surveillance…

Cyberattack

0 SHARES

EU Agree On Cybersecurity Rules

Security is a word that has appeared more and more online when it comes to the digital world in recent years. With more and more attention drawn by everyone from presidential candidates like Donald Trump to toy…

0 SHARES

Gmail to Warn Users About Unencrypted Emails

In recent years, Google has been working hard to improve privacy and security on their services, with the majority of emails sent and received on Gmail now being encrypted. However, to Google, this is not enough,…

0 SHARES

Minecraft Being Used to Recruit Cybersecurity Talent

The UK Government has teamed up with Cyber Security Challenge UK to find fresh talent for the cybersecurity industry, using sandbox building game Minecraft as its recruitment tool. Players who manage to get the better competitions…

0 SHARES

China’s Great Firewall to Be Patrolled by Real-Life Cyberpolice

China has plans to take internet censorship to a whole new level, placing members of a real-life cyberpolice within the country’s biggest online companies to make sure they don’t dun goofed. Chinese “network security officers” will monitor…

0 SHARES

Researchers Hack Air-Gapped Computer Using Nine-Year-Old Motorola Phone

An air-gapped computer is the most secure way of storing sensitive data; a PC that has no internet connection and no removable storage or disk drives cannot be compromised by hackers or government surveillance, in theory. Well, it’s…

0 SHARES

Lizard Squad Hacker Convicted of 50,000 Counts of Computer Crime

A Finnish hacker, and member of the notorious Lizard Squad, has been found guilty of 50,700 charges of hacking, according to the nation’s newspaper, Kaleva. The hacker, 17-year-old Julius “zeekill” Kivimaki, was given a 2-year suspended…

0 SHARES

Trojan Posing as Infamous Movie The Interview Attacks Android Phones

Malware, under the guise of notorious Seth Rogen comedy The Interview, has been attacking Android smartphones in India. The Computer Emergency Response Team of India (CERT-In) first detected the Trojan, proliferated via a link offering a…

0 SHARES

Apple’s Tim Cook Warns Obama That Sacrificing Privacy Will Have “dire consequences”

Tim Cook, CEO of Apple, has criticised US President Barrack Obama’s executive order for enhanced cybersecurity, saying the move will have “dire consequences”. Cook was speaking at a cybersecurity summit organised by the White House, just…

0 SHARES

UK Government Partners With Open University to Teach Cybersecurity Defense

The UK government has partnered with the Open University and plans to launch a cybersecurity course that will open up classes for future candidates.  The multi-year program will hopefully develop students interested in technology to focus…

0 SHARES

New CISPA Regulations Could Classify Netflix as a “Cybersecurity Threat”

It appears that a new cybersecurity bill currently going through the Senate is considered too ‘broad’ and would grant ISPs the liberty to limit streaming services’ delivery to customers, having Netflix given as an example. The…

0 SHARES

Microsoft Launches Security and Threat Information Sharing Platform Named Interflow

Microsoft plans on providing new and more efficient ways for security professionals to effectively and swiftly respond to potential threats. This is why the company has just launched the closed preview of a platform named Interflow,…

0 SHARES

Bank of England Unveils New Framework to Defend Against Cyberattacks

The Bank of England officially launched its CBEST framework to help mitigate the risk of cyberattacks, as criminals continually target banks and other financial institutions. Using guidelines and threat intelligence from the British government and security…