All Blogs / Technology / Security / Popular


Nevada accidentally leaks thousands of medical marijuana dispensary applications

The data includes their dates of birth, home addresses, citizenship, and driving license and social security numbers of the applicants.

Singapore to record iris scans of citizens

Singapore's immigration department says it will begin collecting iris scans of citizens and permanent residents as part of efforts to improve the "effectiveness and efficiency" of its operations.

Next Targets for Cybercriminals: the Long Term (Part 2)

In the previous post in this series, I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging devices connected to the Internet of Things (IoT). Show More Summary

Chrome will soon mark some HTTP pages as 'non-secure'

Google's first wave of security changes to convert webmasters to encrypted HTTPS target pages that ask for login data or credit card information.

Next Targets for Cybercriminals: the Short Term (Part 1)

  Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a china shop. The tougher challenge is figuring out where they will take aim tomorrow. Show More Summary

Where to Donate to Protect the Internet in 2017

In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED.

Floki Bot a Sensation With International Cybercriminals

Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently in use by a number of cybercrime...Show More Summary

Hacker Lexicon: What Is the Attribution Problem?

Did Russia hack the DNC? Did North Korea hack Sony Pictures? Try to answer these questions and you run into the attribution problem. The post Hacker Lexicon: What Is the Attribution Problem? appeared first on WIRED.

Is this the age of the smart wallet, or are they more trouble than they're worth?

If your smart wallet is lost or stolen, you can locate or track it with a smartphone. That's a cool idea, and it has attracted several crowd-funded projects such as Cashew, Ekster, SmartWallet, Walli, Wallor and Woolet. However, small, standalone trackers like TrackR's may do the job cheaper, and they're less risky purchases.

YubiKey for Windows Hello brings hardware-based 2FA to Windows 10

After a wait of nearly two months, Yubico has finally released an app that adds strong hardware authentication for unlocking Windows 10 PCs.

The Year Encryption Won

From Apple vs FBI to WhatsApp, it was a banner year for end-to-end encryption. The post The Year Encryption Won appeared first on WIRED.

Leaked files reveal scope of Israeli firm's phone cracking tech

US law enforcement alone have spent millions on the phone-cracking technology.

Hacks battered IT optimism in 2016; can 2017 enrich defenses

Awareness, standards, innovation key pieces of formula that could deliver better identity, access management

Encryption backdoors are against US national interest, say lawmakers

Encryption is safeguard for our personal secrets and economic prosperity, says report.

?Convenience trumps security with Australian public Wi-Fi habits: RMIT

Around 2 million Australians are accessing internet banking on public Wi-Fi networks, a study by RMIT University has found.

?Austrade to promote Australia's cyber talent to the US

Australia will be sending around 20 cybersecurity companies to the RSA Conference in San Francisco next year to showcase what the nation has to offer.

AGD warned proposed data re-identification laws could kill the data research canary

Industry and government agencies have warned the Attorney-General's Department that the proposed data re-identification laws are too blunt to work.

Facebook received national security letter for customer details in 2015

The number of requests for Facebook to hand over user data by governments around the world has risen in the first half of 2016, according to a new report by the social media giant.

Encryption App ‘Signal’ Fights Censorship With a Clever Workaround

A technique called "domain fronting" makes the app's encrypted traffic look no different from a Google search. The post Encryption App 'Signal' Fights Censorship With a Clever Workaround appeared first on WIRED.

Did You Forget to Patch Your IP Camera?

IP cameras are usually “purchase, install, and don’t touch” devices. But in the current climate of cyberattacks, they now require regular updates and patches. Otherwise your security tool may be hacked, leak video, or join a cybercriminal botnet without your knowing. Show More Summary

Copyright © 2015 Regator, LLC