-
+19 +2Missouri governor calls for prosecution of journalist who flagged website flaw
Missouri Gov. Mike Parson on Thursday called for a criminal investigation into a journalist who discovered a vulnerability on a state website that left the Social Security numbers of thousands of public school teachers exposed.
-
+16 +2Apple warns of cybercrime risks if EU forces it to allow others' software
Apple Inc on Wednesday ramped up its criticism of EU draft rules that would force it to allow users to install software from outside its App Store, saying that would boost the risk of cybercriminals and malware.
-
+33 +2Google to give security keys to ‘high risk’ users targeted by government hackers
Google has said it will provide 10,000 “high-risk” users with free hardware security keys, days after the company warned thousands of Gmail users that they were targeted by state-sponsored hackers.
-
+24 +3Twitch confirms major data breach after its source code and secrets leak out
Twitch creator payouts and internal tools were leaked earlier today
-
+13 +4Most Business Owners do not Disclose Cyberattacks
A recent study shows that remote working still poses a significant cybersecurity risk and that business owners prefer to hide cybersecurity incidents.
-
+27 +4Let's Encrypt's Root Certificate is About To Expire, and It Might Break Your Devices
One of the largest providers of HTTPS certificates, Let's Encrypt, will stop using an older root certificate next week -- meaning you might need to upgrade your devices to prevent them from breaking. From a report: Let's Encrypt, a free-to-use nonprofit, issues certificates that encrypt the connecti...
-
+21 +36 Hacker Pioneers Who Turned the Early Internet on Its Head
In 2021, cybercrime is a normal part of everyday life. But back in the early days of the internet—that is, the 1980s and ‘90s—the hacker was a bizarre new phenomenon that the American public had never encountered before. Many of the trailblazers of this trend weren’t cynical criminals but rather bespectacled teenagers—unadulterated nerds with a penchant for using their advanced computer powers to cause mischief. Back in these days, hacking was less about extortion and moneymaking than it was about hubristic achievement and the desire to do something that had never been done before.
-
+30 +2Growing Use of Cryptocurrency in Afghanistan Poses Security Concerns
The Taliban takeover of Afghanistan has fueled a surge in the use of cryptocurrency as Afghans grasp for ways to cope with a deepening financial crisis, market analysts and local traders say, a trend that may offer hope for an ailing economy, but that poses concerns for Western security officials.
-
+19 +1Germany wants phone makers to offer 7 years of security updates
Your current phone might get security patches for several years to come, at least if Germany has its way. C't reports the German federal government is pushing the European Union to require seven years of security updates and spare parts for smartphones as part of negotiations with the European Commission. That's two years longer than a recent Commission proposal, and would effectively give phones a more computer-like support cycle.
-
+11 +4‘Panic made us vulnerable’: how 9/11 made the US surveillance state – and the Americans who fought back
It took Edward Snowden and other whistleblowers to reveal the staggering extent of the government’s spying on its own people as institutional checks failed. On the morning of 11 September 2001, an 18-year-old was driving his white Honda Civic on the way to work as a freelance web designer. It was a beautiful day under a sparkling blue sky, and as he sped down Maryland’s Route 32 with the window down and radio blasting, the teenager was sure it was going to be a lucky day.
-
+15 +5More than $600 million stolen in what is likely to be one of the biggest cryptocurrency thefts ever
Hackers have started returning some of the $600 million they stole in what’s likely to be one of the biggest cryptocurrency thefts ever. The cybercriminals exploited a vulnerability in Poly Network, a platform that looks to connect different blockchains so that they can work together.
-
+31 +7Password of three random words better than complex variation, experts say
UK National Cyber Security Centre recommends approach for improved combination of usability and safety
-
+25 +6Google Chrome to no longer show secure website indicators
Google Chrome will no longer show whether a site you are visiting is secure and only show when you visit an insecure website. For years, Google has been making a concerted effort to push websites into using HTTPS to provide a more secure browsing experience.
-
+17 +2Smart security: how to keep your home safe while you’re away
With the prospect of trips out and holidays finally on the cards, over the next few weeks many of us will be leaving our houses unattended for the first time in months. So now is the time to think about making your home a bit more secure.
-
+24 +5Spyware successfully broke into journalists' iPhones by sending iMessages that didn't even need to be read
Amnesty International said its analysis indicates all current iPhone models and iOS versions are vulnerable to attack by NSO Group's software.
-
+20 +6IoT Security: Thieves Are Targeting Smart Cameras — Here's How To Stop Them
A major component of IoT security-related crime is theft of live videos. See how easily live feeds can be broken into, and what to do about it.
-
+28 +4How Sketchy Data Scavengers Are Using Hatred Of 'Big Tech' To Attack Plans To Make The Web More Private
We warned that this was likely back when Google announced plans to phase out third-party cookies in Chrome (something all the other major browser makers had already done): that this would be used to attack Google as being anti-competitive, even as it...
-
+23 +2Tech giants tell Australian government they don’t want its software to stop cyber attacks
Tech giants say a new cyber security law to allow government agencies into their networks could cause more harm than the cyber attacks they’re designed to halt.
-
+20 +5PSA: Kaspersky Password Manager has been creating flawed passwords
If you’ve been using Kaspersky Password Manager (KPM) on your iPhone for a while, you may need to generate some new passwords. A security researcher has discovered two flaws that could result in an attacker having to try as few as 100 passwords to find yours …
-
+16 +2The Food Industry May Be Finally Paying Attention To Its Weakness To Cyberattacks
A ransomware attack that shut down several big beef plants is raising concerns about cybersecurity at food companies. Critics say industry consolidation makes the food supply chain more vulnerable.
Submit a link
Start a discussion




















