All Blogs / Technology / Security / Popular

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

DDoS attacks: How an 18-year-old got arrested for trying to knock out systems

After a wave of denial-of-service attacks stretching back to September, Netherlands police have made an arrest.

A flaw in Hotspot Shield can expose VPN users, locations

The virtual private network says it provides a way to browse the web "anonymously and privately," but a security researcher has released code that could identify users' names and locations.

Mission-critical system alert: 40-year-old OpenVMS hit by exploitable bug

OpenVMS bug affects systems running on VAX and Alpha processors, and could impact Intel Itanium systems in mixed-architecture clusters.

ADB.Miner worm is rapidly spreading across Android devices

The malware is targeting and compromising thousands of devices to mine cryptocurrency.

Australian cops to enter kindergartens to teach kids not to cyber

Children as young as four will be given training in identifying suspicious online behaviour.

Bob Mueller’s Investigation Is Larger—and Further Along—Than You Think

We speak about the “Mueller probe” as a single entity, but it’s important to understand that there are no fewer than five separate investigations under the broad umbrella of the special counsel’s office.

Grammarly's flawed Chrome extension exposed users' private documents

The grammar-correcting browser extension is used by about 22 million users.

Apple, Cisco partnership expands with cybersecurity insurance offering

The partnership, which also includes insurer Allianz and risk evaluator Aon, will offer discounts on cyber insurance to joint business customers.

Phishing attacks: How hunting down fake websites is making life harder for hackers

A new approach to phishing URLs and scam emails is helping to reduce the window of opportunity for cyber-attackers -- but the fight isn't over yet.

LuminosityLink spyware giving attackers total control of your PC is taken out by cops

Buyers of the nasty LuminosityLink remote-access trojan will no longer be able to use their spying tool.

Bee Token ICO participants lose $1 million to phishing scam

Despite Bee Token's pleas to take heed of security warnings, many fell prey to fraudsters.

North Korea stole 'billions of won' in cryptocurrency last year

The country's southern counterpart says state-sponsored teams are still hacking into exchanges.

South Korea identifies Flash 0-day in the wild

Excel spreadsheet, Active X, Adobe Flash -- this exploit is a blast from the past with one of everything.

Akamai: IoT the new 'shadow IT' of the enterprise

Internet-connected devices pose a similar threat to the enterprise as shadow IT, with Akamai noting many devices are used on the company network without security in place.

Autosploit, Strava Heat Maps, and More Top Security News This Week

The memo release, Olympics hacking, and more of the week's top security news.

Owl camera watches over your ride from the inside

While LTE-connected products like Verizon's Hum have focused on tracking where your car is and how fast it's going, the new connected 360-degree dashcam focuses on documenting its threats.

The Devin Nunes Memo: Reading Between the Lines

The Devin Nunes memo that purports to show improper surveillance practices is out—and national security experts say it falls far short of the hype.

Copyright © 2015 Regator, LLC