All Blogs / Technology / Security / Popular


Brazilian government to create national information security policy

The first steps towards developing a common set of security guidelines for the public sector are being taken

An Arms Dealer Says Life Under Trump Is a ‘Win-Win’

Business is good, if your business is weapons. The post An Arms Dealer Says Life Under Trump Is a 'Win-Win' appeared first on WIRED.

The Former Secretary of Defense Outlines the Future of Warfare

The former Secretary of Defense built a bridge between tech and the Pentagon. Here, he talks about its importance in an uncertain time. The post The Former Secretary of Defense Outlines the Future of Warfare appeared first on WIRED.

Deleting your Yahoo email account? Yeah, good luck with that

Some Yahoo users say inconsistent security practices makes the account deletion process near impossible.

Your desktop 3D printer is really an IoT device in disguise

There is a double-edged sword to having internet-enabled 3D printers. Like other IoT devices, they may open potential back doors for hacking and breaches.

Hackers are using this Android malware to spy on Israeli soldiers

Social engineering employed to distribute ViperRAT malware which uses infected devices to take photos and record audio.

Zuckerberg's epic Facebook manifesto redacted to omit plans for AI to monitor private messages

In an earlier version of his manifesto for Facebook, Mark Zuckerberg revealed that his vision for AI included monitoring 'private channels' for terrorists planning an attack.

Australia's culture of trust is leaving the country vulnerable: Kaspersky Lab

Kaspersky Lab general manager ANZ Peter Brady said it is the laid back, naive culture Australia has that is resulting in such alarming statistics when it comes to mobile banker Trojan penetration.

Vendor Security Alliance scales up efforts, aims for faster vendor vetting

The nonprofit is aiming to help companies evaluate the security risk associated with different third-party vendors within a matter of minutes.

Identity standards group expands certification program

Those that issue user credentials, and those that accept them, now have access to OpenID Connect certification

The 15 top malware threats facing you and your organisation

Computer viruses, malicious software, banking Trojans, and ransomware are just some of the nefarious ways hackers and cybercriminals are trying to turn your network and data into a payday.

Lone hacker Rasputin breaches 60 universities, federal agencies

Rasputin has danced around the defenses of organizations from NYU and Oxford to the Oklahoma state government.

Telcos could be offshoring Australian metadata and AGD doesn't know where it is

The Australian Attorney-General's Department believes the offshoring of telecommunications metadata is not a security concern.

Xen Project asks to limit security vulnerability advisories

The organization is requesting permission to limit disclosures to only the most severe bugs.

The seven most dangerous attack techniques: A SANS Institute rundown

From ransomware to weak random number generators, the RSA Conference explores the worst threats and how to stop them.

Wickr, the encrypted messaging app, finally goes open source

All it took was nearly five years and a shuffle of senior management.

Yahoo warning users that hackers forged cookies to access accounts

The news comes off the back of Verizon dropping $250 million from its Yahoo purchase price.

How it works: Blockchain explained in 500 words

If electronic money is just data, nothing physically stops a currency holder trying to spend it twice. Enter the Bitcoin blockchain.

This Android Trojan pretends to be Flash security update but downloads additional malware

Malware tricks users into opening Android Accessibility menu, enabling the attacker to mimic the user's clicks and select anything displayed on their screen.

How to handle changing privacy rules around the globe

Trevor Hughes, president and CEO of the International Association of Privacy Professionals, explains how companies should prepare for GDPR and respond to global political uncertainty.

Copyright © 2015 Regator, LLC