All Blogs / Technology / Security / Popular


'Ultrasecure' Samsung Galaxy S8 iris scanner can be easily tricked, say hackers

White-hat hackers in Germany argue it's disturbingly simple to create a 'dummy eye' to dupe the Galaxy S8's biometric security.

Ransomware: WannaCry was basic, next time could be much worse

Some researchers suggest WannaCry was a a basic piece of ransomware - what damage that could be done with more advanced code?

What are "national security letters," and why should you care?

Here's everything you need to know about the secretive FBI's investigative powers.

WannaCry : les vers d’hier font peau neuve

Le vendredi 12 mai en matinée, de nombreuses sources en Espagne ont été les premières à signaler l’apparition d’une vague d’attaques informatiques menées à l’aide du ransomware désormais identifié sous le nom de WannaCry. Dès que McAfee...Show More Summary

Ad fraud loss slides to $6.5 billion worldwide

Digital ad sales are up and vendors are clamping down on fraud schemes designed to siphon cash from the industry.

Now tech support scams are exploiting WannaCry ransomware fears

Police issue warning over fake support scams using WannaCry to scare PC users into paying up.

Singapore government reaffirms $1.7B commitment to smart nation, digital transformation

First announced earlier this year as part of the country's 2017 budget, Singapore's IT office says it will put out S$2.4 billion in ICT tenders encompassing data analytics and Internet of Things sensors.

How to protect your laptop in cargo when you fly

In this guide, learn about current regulations and how to deal with theft, insurance problems and hardware damage.

How to protect your laptop in cargo when you fly (in pictures)

Here are some ways to lower the risk of theft and hardware damage when you travel.

Twitter flaw allowed you to tweet from any account

All this time, a rather simple Twitter bug could have caused chaos on the platform.

An Up-Close Look at the Notorious APT32 Hacking Group in Action

Cybersecurity company Cybereason has shared new details about how one of the world's most mysterious hacking groups operates. The post An Up-Close Look at the Notorious APT32 Hacking Group in Action appeared first on WIRED.

Think Before You Tweet In the Wake of an Attack

Terrorists use social media to recruit, but they also depend on you and the media to use it to amplify their message. The post Think Before You Tweet In the Wake of an Attack appeared first on WIRED.

The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales

A new study raises questions about the deterrence value of harsh sentencing for dark web crimes. The post The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales appeared first on WIRED.

CSIRO uses kinetic harvesting on wearables to open gait security

Collecting energy from a person's movement has the potential to use walking as an authentication option, the CSIRO has said.

APAC firms see data security as key barrier to digital transformation

Some 35 percent of Asia-Pacific companies view the potential failure of securing sensitive data as a top barrier to digital transformation, while others cite rigid IT systems and inability to migrate to the cloud.

Fake WannaCry ‘Protectors’ Emerge on Google Play

Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware cannot harm mobile systems. Nonetheless, some developers are taking advantage of the uproar and possible confusion to promote apps that promise to protect Android devices. Show More Summary

6 Tips For Sharing Your Blog On Social Media

Its no secret that content marketing is growing fast in the digital age of marketing. Its primary use is for engagement between the brand and its consumer, and the faster it pops up on search engines, the better! Which is why its vital...Show More Summary

Fresh wave of mutating Qakbot malware brings down enterprise networks

The malware is able to lock out companies from accessing their networks as well as infecting neighboring systems.

Singapore lets telcos test 5G services for free

Government waives frequency fees for 5G trials until December 2019, in a move aimed at driving the market and uncovering potential use cases for the next-generation network.

Bogus movie subtitles could let hackers take over your device, warn security researchers

Whole devices can be taken over by hackers exploiting a fragmented, community-driven subtitle ecosystem, in what researchers call "the most severe category of vulnerability".

Copyright © 2015 Regator, LLC