All Blogs / Technology / Security / Popular


Hackers are trying to make their malware more powerful by copying WannaCry and Petya ransomware tricks

The outfit behind Trickbot is attempting to give their Trojan malware the self-spreading worm-like capabilities which have made recent ransomware attacks go global.

Freelancer.com alerts users to recycled compromised credentials in its database

The online marketplace told users it detected login credentials matching its customers in a publicly accessible database.

Symantec distrust to begin in Chrome from April 2018

Google's browser will start the process of removing trust from old Symantec TLS certificates in Chrome 66.

Singapore should not criminalise good intent to encourage data sharing in cybersecurity

People who fear prosecution may be less willing to share threat information, which is vital in fending off attacks, and Singapore government should clearly define its proposed mandate for companies to report data breaches within 72 hours.

?US male arrested for string of DDoS attacks against Australia, North America

The two-and-a-half year cross-border investigation has ended with the arrest of an Iranian-born male in the United States.

One Billion Daily WhatsApp Users Prove Privacy Isn't Dead

WhatsApp's rise and Twitter's decline converge to send a message about the way we communicate now.

How these fake Facebook and LinkedIn profiles tricked people into friending state-backed hackers

A hacking operation used photos from an unsuspecting victim's Instagram account as the lure in a campaign that lasted well over a year.

This Android spyware can record calls, take screenshots and video, targets Gmail, LinkedIn, Snapchat data

Google uncovers espionage conducting malware which monitors and steals information about the target - including emails, messages and calls.

No More Ransom project helps thousands of ransomware victims

After only a year, the initiative has unlocked thousands of devices, but there is more work to do.

The Trump-Russia Scandal's Many Swirling Unknowns

What we know so far about the Trump-Russia scandal only suggests more questions—questions Special Counsel Robert Mueller is digging into.

?Google's Trusted Contacts safety app is now available for iOS

Google updates Trusted Contacts with more control over location sharing.

13 technologies that are safer than passwords

Vein scans, eye scans, fingerprint scans and more up the security game

Russian Bitcoin exchange chief arrested in connection to Mt. Gox 'hack'

The Mt. Gox hack which left thousands of investors out of pocket may have connections to Russia.

Analyzing CVE-2017-0190: WMF Flaws Can Lead to Data Theft, Code Execution

CVE-2017-0190 is a recently patched vulnerability related to Windows metafiles (WMFs), a portable image format mainly used by 16-bit Windows applications. Recently we have seen an increase in the number of vulnerabilities related to WMFs and EMFs (enhanced metafiles) in the GDI32 library. Show More Summary

Security flaw in 3G, 4G LTE networks lets hackers track phone locations

The researchers say "very little" can be done to prevent stingray-style surveillance attacks.

Open Letter: Seriously, Roomba, now you're spying on us?

It's not just that iRobot might sell maps of our homes, it's the security implications of what can happen if this oh-so-private information gets into the wrong hands.

Visa expands transaction processing facilities in Singapore, UK

Payment company opens new data centres to meet growing demand for digital payments and support the development of new capabilities in this space.

Anti-Drone Tools Tested: From Shotguns To Superdrones

From anti-drone shotgun shells to a drone-snagging megadrone, security researchers put the drone defense arsenal to the test.

APAC users not confident their online data is properly secured

More than 70 percent of online consumers in Asia-Pacific believe their personal data isn't adequately protected and 55 percent are unlikely to use online services that don't do so.

Copyright © 2015 Regator, LLC