All Blogs / Technology / Security / Popular


An Up-Close Look at the Notorious APT32 Hacking Group in Action

Cybersecurity company Cybereason has shared new details about how one of the world's most mysterious hacking groups operates. The post An Up-Close Look at the Notorious APT32 Hacking Group in Action appeared first on WIRED.

Think Before You Tweet In the Wake of an Attack

Terrorists use social media to recruit, but they also depend on you and the media to use it to amplify their message. The post Think Before You Tweet In the Wake of an Attack appeared first on WIRED.

The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales

A new study raises questions about the deterrence value of harsh sentencing for dark web crimes. The post The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales appeared first on WIRED.

CSIRO uses kinetic harvesting on wearables to open gait security

Collecting energy from a person's movement has the potential to use walking as an authentication option, the CSIRO has said.

APAC firms see data security as key barrier to digital transformation

Some 35 percent of Asia-Pacific companies view the potential failure of securing sensitive data as a top barrier to digital transformation, while others cite rigid IT systems and inability to migrate to the cloud.

Fake WannaCry ‘Protectors’ Emerge on Google Play

Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware cannot harm mobile systems. Nonetheless, some developers are taking advantage of the uproar and possible confusion to promote apps that promise to protect Android devices. Show More Summary

6 Tips For Sharing Your Blog On Social Media

Its no secret that content marketing is growing fast in the digital age of marketing. Its primary use is for engagement between the brand and its consumer, and the faster it pops up on search engines, the better! Which is why its vital...Show More Summary

Fresh wave of mutating Qakbot malware brings down enterprise networks

The malware is able to lock out companies from accessing their networks as well as infecting neighboring systems.

Singapore lets telcos test 5G services for free

Government waives frequency fees for 5G trials until December 2019, in a move aimed at driving the market and uncovering potential use cases for the next-generation network.

Bogus movie subtitles could let hackers take over your device, warn security researchers

Whole devices can be taken over by hackers exploiting a fragmented, community-driven subtitle ecosystem, in what researchers call "the most severe category of vulnerability".

After the ransomware attack: Hospitals are still recovering from the WannaCry infection

While most services have returned to normal, London's Barts Health NHS Trust is still cancelling some appointments and operations in order to "run all services safely".

UK authorities want 'direct access' to internet providers' systems, say critics

The government wants to install black box-type devices on telecoms networks for unfettered access to UK metadata, which one rights group says will "become central to the new surveillance regime."

?Eugene Kaspersky shrugs his shoulders at use of Windows XP

Amid the WannaCry deluge and security vendors offering their own postmortem, ?Eugene Kaspersky seems more concerned over why people are still running Windows XP.

386 WannaCry ransomware samples discovered in the wild

The destructive ransomware has caused chaos and it may be that cyberattackers want to continue capitalizing on the malware.

Europol cracks down on ATM black box attack scheme

The "black box" attacks compromise ATMs to dispense cash.

Apple reveals it received a secret national security letter

Authorities demanded data from twice as many Macs, iPhones, iPads in the second-half of last year than the first-half, despite fewer overall requests.

DTA cyber advisory office to follow and implement ASD policy advice

Despite the creation of the Cyber Security Advisory Office, the Australian Signals Directorate will still be tasked with advising government bodies of information security threats.

Make Your Brand Heard Above the Social Media Crowd

As the need for social media marketing rises, so does the noise as each major brand fights to utilize it. Its becoming easier than ever to have your brand lost in all the commotion. Here are a few steps to take to make your brand heard: 1. Show More Summary

Ransomware: WannaCry was basic, next time could be much worse

Some researchers suggest WannaCry was a a basic piece of ransomware - what damage that could be done with more advanced code?

Facebook's secret guide on sex, violence, and hate speech leaked

The internal documents lay out the social media giant's stance on moral and ethical decisions related to user content.

Copyright © 2015 Regator, LLC