All Blogs / Technology / Security / Popular


How safe is Federal IT? Millennials more likely to trade caution for digital productivity

According to security firm Forcepoint, millennial's behaviour poses significant risk to federal IT systems

Did this ransomware threat drop away because cybercrooks went on holiday?

Figure shows that recorded incidents of Locky, one of the most common malware threats, dropped by over 80 percent during December -- but it'll be back.

Should the cloud close the front door to the database?

The recent MongoDB ransomware hack in the cloud that made headlines earlier this week raises questions as to whether cloud platform providers should take the initiative in babysitting their most negligent customers.

Victorian Game Authority inadvertently emailed customer data to hunters

A Victorian government hunting authority has accidentally sent customer data to people renewing their hunting licences.

Telstra and Ericsson encrypt in-transit data over 10Gbps link

Having encrypted data while in transit over a 10Gbps link between the US and Australia, Ericsson and Telstra are now looking towards testing the optical encryption technology over a 100Gbps link.

Trojan malware blamed for cyberattack at Barts Health NHS hospitals

File-sharing remains offline as a precaution, but hospital says no patient data has been accessed in the attack.

This phishing email uses an unexpected trick to infect PCs with keylogger malware

Rather than using macros, this malware uses Visual Basic Script to avoid detection.

US video surveillance manufacturers face increasing Chinese competition

With the ability to offer low prices without compromising on technical specs, Chinese manufacturers of consumer video surveillance devices will outpace their US peers if market share boils down to a simple price war.

If vendors cannot keep a phone updated, why trust them with your household items?

Unless your next smart fridge is going to have a support lifecycle the length of Windows XP, it's going to be cracked in a couple of years.

Trojanized Photo App on Google Play Signs Up Users for Premium Services

Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a misnamed app that turned out to be malicious. Every Android app has an ID value, commonly known as the package name, to uniquely identify it on a device and in Google Play. Show More Summary

Turkish Instagram Password Stealers Found on Google Play

Intel Security’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed the apps.) These malware are distributed as utilities and tools for analyzing access and automating the following of Instagram accounts. Show More Summary

BrickHouse Security to Attend IACP Conference in Indianapolis

BrickHouse Security is proud to be a part of the Indiana Association of Chiefs of Police Conference in Indianapolis on January 25th. The Mid-Winter conference will host nearly 100 booths, all geared towards law enforcement solutions....Show More Summary

Plug car security holes before self-driving vehicles arrive, industry warned

European security agency says more needs to be done to make autonomous cars secure.

Largest NHS trust hit by 'IT attack'

"Tried and tested" contingency plans are being used to ensure patient care is "not affected" says Barts Health group of hospitals.

No hiding from this new web fingerprinting tech: But one browser can still hide your ID

Researchers are now able to indentify 99 percent of users through a new browser fingerprinting technique.

Robots need rights, and kill switches too, warn politicians

Robots could be given 'electronic person' status, says report, which argues a legal framework is urgently needed for robots and self-driving cars.

How to use Google two-factor authentication

If you use Google services, and you don't want anyone raiding or wrecking your account and services--not to mention your life--Google two-step verification security is for you.

?First came mass MongoDB ransacking: Now copycat ransoms hit Elasticsearch

Hundreds of unsecured Elasticsearch servers have been wiped in the past few hours in what could be a repeat of the recent mass ransom attacks on MongoDB databases.

Copyright © 2015 Regator, LLC