All Blogs / Technology / Security / Popular


Australian government is not interested in encryption backdoors: Turnbull

Australian Prime Minister Malcolm Turnbull has moved to clarify the approach the government will take towards encrypted communications.

UK and France propose fining Facebook and Twitter if extreme material left online

Theresa May and Emmanuel Macron have said they are determined to ensure the internet could not be used as a safe space for terrorists and criminals.

Surprise! Tech transparency reports aren't all that transparent

Context is everything, and raw data demands don't tell the full story.

3 Things To Try Before “Giving Up” On Social Media Marketing

Despite being one of the most cost-effective and successful marketing platforms in the modern world, a lot of social media accounts out there are “dead”. In other words, the brand did not get the ROI they had hoped for and have resorted back to more traditional (even outdated) forms of marketing. Show More Summary

Russian malware 'likely' to blame for Ukrainian power grid attack

Eset researchers call the malware a "wake-up call" for other electrical systems around the world.

Ransomware-as-a-service schemes are now targeting Macs too

MacRansom is the first known instance of ransomware-as-a-service targeting OS X.

3 things you need to know about cybersecurity in an IoT and mobile world

The stakes are getting a lot higher in cybersecurity. It's no longer just about a loss of productivity and profitability. Your compromised network could become a public safety risk.

DoubleSwitch Twitter Attack Wreaks Havoc

A Twitter attack, an Al Jazeera cyberattack, and more: Each weekend we round up the news stories that we didn’t break or cover in depth but that still deserve your attention.

The dumbest passwords people still use

Everybody knows that 12345 is a bad password. But what they're using instead isn't much stronger

There’s A Natural Need For Approval On Social Media, Here’s How to Utilize It For Your Strategy

Humans have a natural need for approval, and this is most evident on social media. People don’t spend hours on these social networks posting both personal and public status updates, pictures, videos, etc. for the heck of it. They do it for the attention! They want to appear happier, healthier, wealthier, funnier, smarter, etc. Show More Summary

How the Right and Left Saw James Comey's Senate Testimony Today

When former FBI director James Comey spoke, both sides of the political spectrum heard very different things.

James Comey's Senate Testimony Raised As Many Questions as Answers

Former FBI director James Comey's Senate testimony did not disappoint---and raised as many questions as it answered.

Ai Weiwei Gets Artsy-Fartsy About Surveillance

A new exhibition in New York puts the surveillance state on display.

Banned From the US? There's a Robot for That

At the world's biggest human-computer interaction conference, researchers threatened by Trump's travel ban use telepresence robots to bridge the divide.

Security News This Week: OneLogin Had One Very Bad Breach

Each weekend we round up the news stories that we didn’t break or cover in depth but that still deserve your attention.

Dangerous 'Fireball' Adware Infects a Quarter Billion PCs

A widespread adware infection hides the ability to inflict far worse than spammy browser tweaks.

Researchers Sniff Out Stingrays With Ridesharing Cars

University of Washington researchers put sensors in 15 ridesharing cars, and uncovered new evidence of how stingrays are being used and how to detect them.

Don't Buy Into Putin's Latest Misdirection on Election Hacking

Vladimir Putin says "patriotic" Russian hackers may meddle in elections, but he's just creating more noise.

Inside Google's Global Campaign to Shut Down Phishing

It's not easy keeping billions of devices safe from phishing attacks. Here's how Google pulls it off.

Copyright © 2015 Regator, LLC