All Blogs / Technology / Security / Popular

Snoopers' Charter, round two: Privacy campaigners gear up for next web surveillance battle

Human rights group Liberty has raised funds for a judicial review of the controversial web surveillance law.

Secrecy mounts over White House cybersecurity staff shakeup

The Obama-appointed chief information security officer was charged with keeping staff working closely with the President safe from cyber-threats posed by hackers and nation-state attackers.

Trump’s Cybersecurity Chief Could Be a ‘Voice of Reason’

Homeland security advisor Tom Bossert stands out in Trump's cabinet as a cautious wonk among hotheads. The post Trump's Cybersecurity Chief Could Be a 'Voice of Reason' appeared first on WIRED.

?Spammer's delight: Gmail weirdly doesn't see spoofed addresses as junk

Spammers could have a field day with Gmail users, simply by spoofing real Gmail accounts, according to a security researcher.

NZ privacy commissioner recommends Australia's data re-identification criminalisation lead

The Commissioner wants to see harsher penalties in place for data re-identification, such as a NZ$1 million fine for breaching privacy-related laws.

Privacy 101: How to never lose your iPhone again

Losing your iPhone used to be a headache. Just make sure you turn this feature on.

Former NSA contractor indicted over 50TB gov't classified data theft

The former contractor reportedly spent 20 years pilfering government secrets and helping himself to the cream of the NSA's hacking tools library.

Forcepoint acquires Skyfence in cloud security push

The deal aims to give Forcepoint customers a clearer view as to how their data is stored and distributed in the cloud -- and how secure it really is.

Google plans purge of Play Store apps without privacy policies

When Google's cleanup is complete, the platform could be cleansed of millions of half-baked apps which put your privacy and data at risk.

Google let scammers post a perfectly spoofed Amazon ad in its search results

Anyone who searched for "Amazon" were presented the rogue ad that aimed to trick users into falling for a Windows support scam.

This modular backdoor malware is now the most common threat to Android smartphones

For the first time in a year, Hummingbad isn't the most prolific form of malware on mobile devices

This 'invisible' memory-based malware is infiltrating organisations across the globe

Cybercriminals are using legitimate software to collect enterprise passwords and other credentials.

HackerOne raises $40 million to empower hacking community

The successful Series C finance round brings the bug bounty platform's funding to $74 million.

Sophos snaps up machine learning tech firm Invincea to fight modern malware

The anti-malware provider has been acquired in a deal worth $100 million.

Thousands of WordPress websites defaced through patch failures

A patched zero-day vulnerability is at fault, but webmasters are not paying attention to updates.

St. Jude Medical admits new cardiac device flaws discovered, issues patch update

The medical device maker has fixed another Merlin@home Transmitter flaw which makes them vulnerable to cyberattacks.

Samsung SDS gets certification for EMM solution on iOS

The Common Criteria (CC) validation follows the NIAP approval for the Android version back in 2015.

?SonicWall reports 638 million instances of ransomware in 2016

The network security firm said ransomware was the payload of choice for malicious email campaigns and exploit kits in 2016, with Locky claiming the title as the most popular payload globally.

Data re-identification criminalisation law should be passed: Senate committee

Overriding concerns about the scope, burden of proof reversal, criminalisation, and retrospective application of the law, a Senate committee has recommended that the data re-identification Bill be passed.

Copyright © 2015 Regator, LLC