All Blogs / Technology / Security / Popular


Singapore aims to drive up standards for autonomous vehicles with test centre

Spanning two hectares, the new test site will be used to trial communication and interaction between autonomous vehicles and other road vehicles.

Open source's big weak spot? Flawed libraries lurking in key apps

To avoid becoming the next Equifax, it could be a good idea to scan your apps for vulnerable open-source libraries.

Optus Business injects AU$3.5m in cybersecurity research centre

Optus will provide AU$2.1 million in cash and AU$1.4 million worth of expertise for development and training to the Cyber Security Cooperative Research Centre over the next seven years.

HP patches severe code execution bug in enterprise printers

The vulnerability could be exploited to perform remote code execution.

Google admits tracking users' location even when setting disabled

After Quartz revealed Google was tracking the location of a user through cell tower connections, the search giant said the function improves the speed and performance of message delivery.

Uber says unauthorised transactions in Singapore not linked to global breach

Uber has dismissed suggestions that a spate of unauthorised transactions reported by customers in Singapore is related to its global data breach, which does not involve financial information.

Cisco, Interpol team up to share cybercriminal threat data

The tech giant and law enforcement agency will share intelligence on the latest cyberthreats.

Intel: We've found severe bugs in secretive Management Engine, affecting millions

An attacker can use Intel's flaws to run malware that's invisible to the operating system.

Malware Mines, Steals Cryptocurrencies From Victims

How’s your Bitcoin balance? Interested in earning more? The value of cybercurrency is going up. One way to increase your holdings is by “mining,” which is legal as long as it is done with the proper permissions. Using your own mining equipment or establishing a formal agreement for outsourcing are two methods. Show More Summary

Palo Alto Networks reports strong Q1 results, appoints new CFO

The security company beat market expectations, crediting its "land and expand" strategy for the strong quarter.

Is Germany right to tell parents to destroy kids' smartwatches over snooping fears?

After banning smart dolls, Germany now says no to smartwatches that allow parents to listen in on classrooms.

Four methods hackers use to steal data from air-gapped computers

Air-gapped computers are seen as high-value targets, so considerable research has gone into taking data from them -- without a network connection. Here's what you need to know.

Lazarus Cybercrime Group Moves to Mobile Platform

When it comes to describing cyberattacks, the word sophisticated is used a lot. Whether to explain yet another “advanced” campaign by a threat actor group hoping to steal information or disrupt computer systems, it seems the precursor to any analysis is to call it sophisticated. Show More Summary

Android Malware Appears Linked to Lazarus Cybercrime Group

The McAfee Mobile Research team recently examined a new threat, Android malware that contains a backdoor file in the executable and linkable format (ELF). The ELF file is similar to several executables that have been reported to belong to the Lazarus cybercrime group. Show More Summary

IoT Devices: The Gift that Keeps on Giving… to Hackers

McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. Show More Summary

Linus Torvalds: 'I don't trust security people to do sane things'

The prominent Linux engineer has suggested models used to approach kernel security are entirely wrong.

How many must be killed in the Internet of Deadly Things train wrecks?

History tells us that technology doesn't get regulated properly until people start to die. Why will IoT be any different?

StartCom to shut down, all certificates revoked in 2020

Embattled Chinese certificate authority could not recover from blacklistings by browser makers.

Copyright © 2015 Regator, LLC