How to protect yourself from hackers
CNN Tech’s Samuel Burke walks you through the steps you can take to protect yourself from being hacked. Read more
How to protect yourself from hackers Read More »
CNN Tech’s Samuel Burke walks you through the steps you can take to protect yourself from being hacked. Read more
How to protect yourself from hackers Read More »
“Speaking about growing DDoS attacks against Bitcoins stock exchanges and other infrastructure companies, they are likely conducted to influence Bitcoin exchange rate (in USD) by unfair traders and speculators. Such wild speculative tactics and the ease of the attacks reminds me 1929 in the US. Read more
Major Bitcoin Exchanges Hit By Cyberattacks As Record Rally Makes Them A Target Read More »
Science Magazine reports a team of physicists using the Chinese Micius satellite (launched back in August 2016) have sent quantum-entangled photons from a satellite to ground stations separated by 1200 kilometers, smashing the previous world record. Sending entangled photons through space instead of optical fiber networks with repeaters has long been the dream of those
Chinese Satellite Breaks Distance Record For Quantum-Key Exchange Read More »
“Mazda cars with next-gen Mazda MZD Connect infotainment systems can be hacked just by plugging in a USB flash drive into their dashboard, thanks to a series of bugs that have been known for at least three years,” reports Bleeping Computer. “The issues have been discovered and explored by the users of the Mazda3Revolution forum
You Can Hack Some Mazda Cars With a USB Flash Drive Read More »
Several popular Android apps in Google Play are rigged with a third-party library that continuously pops up ads even if the user tries to force close them. SophosLabs discovered the library earlier this week and detects it as App/MarsDae-A. So far, more than 40 apps on Google Play use the library, which has been downloaded
The Google Play adware apps that just won’t die Read More »
A serious flaw in Facebook’s software put counter-terrorism moderators at risk after revealing their personal details to the very people they were monitoring. The bug caused the personal profiles of content moderators to be in displayed in the activity logs of groups where targets were admins. Read more
Facebook moderators exposed to suspected terrorists Read More »
Microsoft’s Advanced Threat Analytics (ATA) platform for detecting cyberattacks can be evaded by attackers to achieve organizational control, a security researcher has discovered. ATA works by reading information from multiple sources: Windows Event Logs, SIEM events, and certain protocols to the Domain Controller. When communication to the Domain Control is done using protocols like Kerberos,
Hacker Bypasses Microsoft ATA for Admin Access Read More »
Cloud services revenue is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020, driving the market for products to secure data in the cloud. Read more
Forrester: Rapid Cloud Adoption Drives Demand for Security Tools Read More »
A marauding group of threat actors dubbed FIN10 has extorted hundreds of thousands of dollars in bitcoins from Canadian companies in a cybercrime campaign that appears to have started at least as far back as 2013. Security vendor FireEye on Friday released a report describing the group’s activities and warning about active cyber-extortion campaigns against
FIN10 Threat Actors Hack and Extort Canadian Mining, Casino Industries Read More »
The arrival of autonomous vehicles (AV, or self-driving vehicles) on the public highways is getting closer. Just this month (June 2017), Nutonomy announced a partnership with Lyft for R&D on its existing AV testing on the streets of Boston. Lyft announced yesterday that by 2025 it will provide “at least 1 billion rides per year using
Senators Say Cybersecurity Should be Top Priority for Autonomous Vehicles Read More »