|Filed Under:||Technology / Security|
|Posts on Regator:||1872|
|Posts / Week:||28.9|
|Archived Since:||August 24, 2016|
The prominent Linux engineer has suggested models used to approach kernel security are entirely wrong.
History tells us that technology doesn't get regulated properly until people start to die. Why will IoT be any different?
Embattled Chinese certificate authority could not recover from blacklistings by browser makers.
The latest initiative in Bankwest's 'cloud-first' approach to service delivery has seen the security gateway for its broker website delivered via Lambda.
Threat of the malicious insider is very real, but accidental data leakage is a bigger problem.
Some 87 percent of IT decision makers in Singapore say machine learning will speed up decision-making process as well as facilitate automation in security operations.
Opinion: The researcher has discarded $30,000 to ensure there is full public disclosure of the drone maker's poor security and revealing how not every bug bounty hunt ends well.
The government-backed broadcaster has confirmed that data from an unsecured repository was exposed.
NASA in its annual report recounted years of challenges with IT governance, security and the problems with managing about 500 IT systems.
Spin-off from Zeus malware adds features which make it look more like an espionage tool rather than malware for just stealing bank details.
With the security of its 60 million national ID smartcards in question, Spain faces some tough choices.
A malicious courier could easily freeze the Key's Cloud Cam and roam a customer's house unmonitored.
IBM Security, the Global Cyber Alliance and Packet Clearing House are offering the automated security solution for free with individuals and SMBs in mind.
General Data Protection Regulation, or GDPR, is coming. Here's what it means, how it'll impact individuals and businesses.
OnePlus will roll out a fix for a serious flaw in a diagnostics app that some argue shouldn't even be on devices.
A series of documents outlining the security and usability standards by which Australians' digital identity information is to be collected, stored, and used has been released by the government.
Tens of thousands of users have downloaded two newly uncovered forms of malware.
The retailer says that some customer credit cards may have been compromised.
Since there is no such thing as an always secure device, Internet of Things Alliance Australia has said a certification tick will ensure a device can be secure if used in recommended ways.
The North Korean government has likely been using the malware since 2016 to target the aerospace, telecommunications, and finance industries, the US government says.