All Blogs / Technology / Security / New


Too noisy, low-level and unethical: Why some cybercriminals hate ransomware

"We are digging our own grave," warn some online criminals who are worried how high-profile ransomware attacks like WannaCry are boosting awareness and cyber security knowledge.

CCTV cameras enslaved to infiltrate air-gap networks

Surveillance camera lighting systems can create a web of light for leaking and extracting data from networks.

Telstra spending 'a lot of time on 5G': Penn

Telstra's 5G NR trials with Ericsson and Qualcomm are going well, Telstra CEO Andy Penn has said, with Telstra to host a 3GPP standards meeting in a year after a live trial of its 5G network in April.

Donald Trump’s United Nations Speech Stokes North Korea Tensions

At the United Nations Tuesday, Donald Trump's incendiary North Korea remarks pushed the word even further from a peaceful outcome.

Twitter suspends 299,000 accounts linked to terrorism in past six month

The company said 75 percent of the infringing accounts were suspended before their first tweet.

Equifax lesson: It's time for tougher rules, regulations, fines to combat breaches

Can oversight and stiff punishments spur enterprises to prioritize cybersecurity and secure their data?

The political challenges of implementing smart city solutions

Andy Berke, mayor of Chattanooga, Tennessee, talks about balancing the political demand for short-term results with long-term goals.

Low-cost tools making cybercrime more accessible: SecureWorks

A report from the security vendor has said the increasing affordability of cybercrime tools is providing budding criminals with a low barrier of entry into the game.

New alliance advocates the blockchain to improve IoT security, trust

The Trusted IoT Alliance hopes to "set the standard" for IoT blockchain protocols worldwide.

Hackers reveal leading enterprise security blind spots

Mobile devices and facial recognition software have made the list this year.

Double trouble: This ransomware campaign could infect your PC with two types of file-locking malware

Victims around the world hit by criminals who can switch the malicious payload of emails between Locky and FakeGlobal on a whim.

Enterprise IT security planning: Five ways to build a better strategy

Struggling to get the boss to take security seriously? Here are some pointers that can help the board get on-board.

Phishing: These are the days of the week when you're most at risk

Security threats vary by the day of the week, with more malicious software detected on Mondays.

EFF resigns from W3C in wake of EME DRM standardisation

Failure to protect researchers and abandonment of consensus has seen the digital rights organisation walk away from the W3C consortium.

How to use Let's Encrypt to secure your websites

Let's Encrypt is easy to use and free -- no wonder it's the most popular Certificate Authority for securing websites. Here's how you can use it.

CCleaner Malware Shows Software's Serious Supply-Chain Security Problem

Hackers have targeted software's supply chain in three high profile attacks discovered in the last three months.

As wearables have evolved to standalone IoT devices, security demands have changed too

Samsung's Eric McCarty on how the evolution of wearables has changed the security imperative.

The security factors behind AT&T's decision to deploy LTE-M

Chris Penrose, the president of IoT solutions at AT&T, explains how IoT network standards can influence security.

Copyright © 2015 Regator, LLC