All Blogs / Technology / Security / Popular


So Hey, What’s Devin Nunes Been Up to Lately?

The House Intelligence Committee chair has had himself quite a week. The post So Hey, What’s Devin Nunes Been Up to Lately? appeared first on WIRED.

The uncrackable problem of end-to-end encryption

The government wants a backdoor into WhatsApp. But that won't happen - and it wouldn't fix the problem we have, either.

Nokia to smartphone owners: Malware infections are far higher than you think

Nokia warns that mobile malware infections grew dramatically in the second half of 2016.

Security awareness relies on balance of technical, human-behavior skill sets

On one side sits a technical security practitioner. On the other sits a person with advanced skills in changing behaviors and community engagement. Which creates successful security awareness?

UK targets WhatsApp, encrypted messaging apps following London attack

The UK government has focused its attention on WhatsApp, claiming there should be "no place for terrorists to hide."

Satnav spoofing attacks: Why these researchers think they have the answer

With concerns rising about the vulnerability of satnav to hackers, researchers have designed a way of protecting signals from new European global navigation system Galileo.

APAC accounted for majority of botnet detections globally

Asia-Pacific contributed more than 50 percent of total botnet detections in the second half of 2016, with the Philippines, Indonesia, India, Thailand, and Malaysia among top 10 countries.

This is the dishwasher with an unsecured web server we deserve

Why wouldn't you want to have your restaurant's dishwasher hooked onto the internet at large?

How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking

Hackers claim that they'll wipe out hundreds of millions of iCloud accounts on April 7. Apple says there's no breach. Here's what to do in the meantime. The post How to Protect Your iCloud Account, Juuust in Case Those Hackers Aren’t Joking appeared first on WIRED.

?Microsoft yanks Docs.com search after complaints of exposed sensitive files

Security experts pointed to numerous sensitive and personal files found on Microsoft's document sharing site, which lets users share documents publicly by default.

How to control what data your Android apps transmit

If you are concerned about what personal information apps want from your Android, here are some settings you can tweak to send only the information you want from your device.

How to protect your Apple iCloud account

Worried about hackers destroying your iCloud music, pictures and documents? You should be. However, there are three things you can do right now: Backup your data, change your password and enable 2FA. Here's how, step by step.

The reasons why you should hide your IP address

As your IP becomes firmly linked to your physical identity, it is more important than ever that we take personal responsibility for how exposed we allow ourselves to be online.

Contact centers branded the 'Achilles heel' of the enterprise

Could phoneprinting tackle the contact center weak link in the enterprise chain?

Google proposes sending Symantec to TLS sin bin

Certificates from Symantec would have their trust period reduced to nine months under Google's plan.

Apple iCloud ransom demands: The facts you need to know

ZDNet has uncovered several loose ends with a claim regarding millions of iCloud accounts held for ransom, and questions remain. Users should act out of an abundance to protect their accounts.

Senate votes to repeal broadband privacy rules

The FCC rules were already in limbo, thanks to the commission's new Republican leadership, but Congress can now put the nail in the coffin.

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

The leak shows how physical access hacks can plant undetectable spying code deep in a Macbook's firmware. The post WikiLeaks Reveals How the CIA Can Hack a Mac's Hidden Code appeared first on WIRED.

Bitcoin scams: Beware of crooks trying to steal your cryptocurrency with these schemes

Cybercriminals are successfully taking advantage of social media and naivety to steal Bitcoin and distribute malware.

Executive's guide to implementing blockchain technology

The technology behind bitcoin is one of the internet's most promising new developments. Here's how businesses can use it to streamline operations and create new opportunities.

Copyright © 2015 Regator, LLC