All Blogs / Technology / Security / Popular


A dozen helpful Amazon Echo how-to tips and tricks

Want some very cool tricks (and helpful tips) for getting the most out of your Amazon Echo? You're in the right place. David Gewirtz has updated his original 2015 article with a dozen handy how-tos you're sure to use right away.

CIA tools exposed by Wikileaks linked to hacking across 16 countries

Cyberespionage tools have been used by North American-based Longhorn group against foreign targets for a sustain amount of time, say researchers.

?Payday lender Wonga confirms data breach

Wonga is urging customers to contact their bank as card information is believed to be among the leaked data.

Hackers are attacking Word users with new Microsoft Office zero-day vulnerability

The bug affects all supported versions of Microsoft Word, including users of Windows 10.

Tax Scams Are Absurdly Common. Here’s How to Protect Yourself

Tax fraud is a free-for-all, it's time to take back some control. The post Tax Scams Are Absurdly Common. Here’s How to Protect Yourself appeared first on WIRED.

Critical Office Zero-Day Attacks Detected in the Wild

At McAfee, we have put significant efforts in hunting attacks such as advanced persistent threats and “zero days.” Yesterday, we observed suspicious activities from some samples. After quick but in-depth research, this morning we have confirmed these samples are exploiting a vulnerability in Microsoft Windows and Office that is not yet patched. Show More Summary

Why It’s So Hard to Wipe Out All of Syria’s Chemical Weapons

In 2013, the world disposed of 1300 tons of Syria's chemical weapons. It wasn't enough. The post Why It’s So Hard to Wipe Out All of Syria’s Chemical Weapons appeared first on WIRED.

So, Bad News: Now Militants Are Using Drones as Projectiles

Weaponizing drones is one thing. Now, the drone itself is the weapon. The post So, Bad News: Now Militants Are Using Drones as Projectiles appeared first on WIRED.

The US Strike on Syria Underscores Trump’s Media-Fueled Worldview

Trump had no interest in attacking Syria---but the narrative left him no choice. The post The US Strike on Syria Underscores Trump’s Media-Fueled Worldview appeared first on WIRED.

Trump & Co. Just Picked the Wrong Fight With Twitter

On Thursday, Twitter got a chance to flex its free-speech championing muscle. The post Trump & Co. Just Picked the Wrong Fight With Twitter appeared first on WIRED.

Devin Nunes: A Running Timeline of His Surveillance Claims and White House Ties

The House Intelligence Committee chair has had himself quite a week. The post Devin Nunes: A Running Timeline of His Surveillance Claims and White House Ties appeared first on WIRED.

Total-Takeover iPhone Spyware Lurks on Android, Too

A version of the nation-state favorite Pegasus software researchers found on iOS officially hit Android as well. The post Total-Takeover iPhone Spyware Lurks on Android, Too appeared first on WIRED.

A huge trove of patient data leaks, thanks to telemarketers' bad security

The data of almost a million patients with diabetes and other medical ailments has been secured.

?Commonwealth cybersecurity compliance to be probed by parliamentary committee

A joint committee has announced an inquiry into the cybersecurity compliance of Australian government departments.

For internet privacy, a VPN won't save you

In theory, getting a VPN is good advice. But the technology hasn't caught up to modern standards yet, and some "safe" services could put you at greater risk.

Singapore most recalcitrant with regards to IT use

Country has most number of employees who are unaware or do not always comply with IT policies among Asean markets, where 81 percent use their own devices for work.

Elite Chinese hackers target board directors at some of the world's largest firms

The APT 10 hacking group has struck again, this time using a watering hole attack to compromise the National Foreign Trade Council website and gather sensitive data about its directors.

Best Security Practices for Dealing With the Internet of Things

The Internet of Things is growing fast. Intel sees the market for IP-connected hardware reaching 200 billion devices by the end of 2020. (See “A Guide to the Internet of Things” graphic, at the end of this post.) Given this widespread adoption, security should be a primary concern. Show More Summary

McAfee Labs Threats Report Explores Threat Intelligence Sharing and Mirai, the IoT Botnet

In the McAfee Labs Threats Report: April 2017, published today, we explore two key topics. Following an announcement by the Cyber Threat Alliance of its formal incorporation and the release of a threat intelligence sharing platform, we provide some perspective about threat intelligence sharing. Show More Summary

SailPoint tackling unstructured data vulnerabilities for Australian organisations

As one obstacle is contained and another emerges, a new attack vector area gaining traction with the bad guys is unstructured data, SailPoint co-founder Kevin Cunningham has said.

Copyright © 2015 Regator, LLC