-
+21 +1Japan's cyber-minister 'never used computers'
Yoshitaka Sakurada is responsible for ensuring the 2020 Olympic Games are not hacked.
-
+13 +1The 20 best cybersecurity conferences in 2019
Planning your travel and training budget to ensure you and your staff are up to date on IT security topics? Here are the best options and what to expect from each event.
-
+23 +1Tumblr Promises It's Fixed a Bug That Left User Data Exposed
Tumblr said on Wednesday that it acted quickly to fix a bug on its blogging site that left user data exposed. The New York-based company added that it couldn't be sure which users were affected by the bug, but said there's no evidence that any data was stolen by hackers.
-
+35 +1‘Do Not Track’ Privacy Tool Doesn’t Do Anything
The privacy tool used by millions of people doesn’t actually protect your privacy.
-
+19 +1Internet Hacking Is About to Get Much Worse
We can no longer leave online security to the market.
-
+19 +1Biggest cyberthreats according to top cybersecurity experts
There's no question the bad guys are trying to break in. Top cybersecurity experts from Homeland Security, the National Intelligence director's office, and private industry gathered to discuss the most urgent threats and how they're working to counter them.
-
+18 +1Cybersecurity Tech Accord: High tech declaring war on hackers?
This unprecedented alliance signals a shift in the way security is done. Here's what you need to know.
-
+16 +1Wireless Carriers Have A SIM Hijacking Problem They Don't Want To Talk About
Wireless carriers are coming under increasing fire for failing to protect their users from the practice of SIM hijacking. The practice involves posing as a wireless customer, then fooling a wireless carrier to port the victim's cell phone number...
-
+20 +1Programmer tried to sell cyberweapon on dark web for $50M
The incident offers a lesson to business leaders on how to deprovision employees facing dismissal and protect assets.
-
+13 +1How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
-
+16 +1Schneier warns of 'perfect storm': Tech is becoming autonomous, and security is garbage
With insecure computers in charge, the healthcare and transportation sectors have become a nexus of security problems, infosec veteran Bruce Schneier warned delegates at Israel Cyber Week.
-
+16 +1FBI warns of increasing ransomware, firmware attacks
It’s not just your IT shop. Ransomware, insider threats, and attacks on firmware and hardware are growing cyberthreats, reports an FBI spokesperson.
-
+14 +1Wireless Carriers Hope You Won't Notice Their Location Data Scandal Makes The Facebook, Cambridge Fracas Look Like Amateur Hour
When the Facebook, Cambridge Analytica scandal broke, we noted that however bad you thought that scandal was (and it certainly was bad), it couldn't hold a candle to the routine privacy abuses that have occurred in the telecom sector for the...
-
+8 +1Wi-Fi Privacy Police - Apps on Google Play
Wi-Fi Privacy Police prevents your smartphone or tablet from leaking privacy sensitive information via Wi-Fi networks. It does this in two ways:* It prevents your smartphone from sending out the names of Wi-Fi networks it wants to connect to over the air. This makes sure that other people in your surroundings can not see the networks you've connecte to, and the places you've visited.* If your smartphone encounters an unknown access point with a known name (for example, a malicious access point pretending to be your home network), it asks whether you trust this access point before connecting. This makes sure that other people are not able to...
-
+11 +1Signs of sophisticated cellphone spying found near White House, U.S. officials say
A federal study found signs that surveillance devices for intercepting cellphone calls and texts were operating near the White House and other sensitive locations in the Washington area last year.
-
+6 +1Another Report Highlights How Wireless SS7 Flaw Is Putting Everyone's Privacy At Risk
Last year, hackers and security researchers highlighted long-standing vulnerabilities in Signaling System 7 (SS7, or Common Channel Signalling System 7 in the US), a series of protocols first built in 1975 to help connect phone carriers around the...
-
+3 +1Data Center Organization Tips
Keeping these server farms organized is key to making sure they run smoothly, preventing accidents, and reducing clutter. Here are some steps to follow.
-
+16 +1Password Formulas Don’t Fool Hackers
Every time we write about passwords on Lifehacker, a few readers share their secret formula for creating passwords. According to Ryan Merchant, senior manager at the password manager Dashlane, those formulas are easy to hack.
-
+24 +1Microsoft, Google: We've found a fourth variant of Meltdown-Spectre CPU holes
Data-leaking flaw exists in Intel, AMD, Arm, POWER processors
-
+2 +1Millennials Play a Key Role in Solving the Cybersecurity Skills Shortage
A recent survey found that while many millennials lack awareness about IT security as a career path, they could play a key role in helping organizations address the cybersecurity skills shortage.
Submit a link
Start a discussion




















