Archive

Researchers who work for environmental regulators around the world are hiring computer hackers to examine the engine control units of several makes of car. The International Council on Clean Transportation (ICCT), which helped expose the Volkswagen emissions scandal, wants the

The federal government has requested at least 63 court orders directing Apple or Google to help unlock a mobile device in police custody, the American Civil Liberties Union (ACLU) said on Wednesday. The cases span from coast to coast and

It’s a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers… imagine if you were responsible for the security of Britain’s nuclear deterrent? As The Telegraph reports, “legitimate concern”

While some college students spend their spring break at the beach, those on eight university teams will devote part of theirs to protecting financial institutions from a cyberattack. The 2016 National Cyberwatch Center Mid-Atlantic Regional Collegiate Cyber Defense Competition will take

NJ Transit police officers were targeted by hackers associated with the ISIS terror group who encouraged supporters to carry out “lone wolf” attacks on the officers, a report said. Caliphate Cyber Army, formerly known as the Islamic Cyber Army, recently

White nationalist hacker Andrew Auernheimer, who goes by the online alias weev, has claimed responsibility for executing a command to printers across the open internet to print racist and anti-Semitic fliers. The fliers, which included imagery of swastikas, were recently

Facebook has patched two vulnerabilities which affected approximately one million users of Instagram and left their accounts open to compromise. The social networking giant awarded $5,000 to Belgian security researcher Arne Swinnen, who discovered the security flaw, as part of

Ransomware infections have seen exponential growth in 2016, as security researchers report both old encrypting malware like Cryptolocker and new versions like Locky are utilizing craftier methods to attack machines and encrypt files before victims even realize what’s happened. Victims

Malware expert Jerome Segura says Australia’s most popular classifieds site, Gumtree.com.au, was serving the world’s most capable exploit kit to some of its millions of monthly visitors. The site is Australia’s twelfth-most-popular website and last month attracted some 47.8 million

MedStar Health, a group of Baltimore, Maryland hospitals, shut down their entire network yesterday to stop the spread of an unidentified malware attack. As of today, the network is back up and running. “Our team quickly made a decision to

Custom-built malware is stealing credit card details directly from retail point-of-sale (POS) systems, cybersecurity researchers have warned. The malware, dubbed TreasureHunt, has been observed by FireEye, which has warned the POS-targeting software is being used to steal information from specific

In recent years, we’ve seen attitudes toward computer security shift from “let’s wait and see” to “protect yourselves at all costs.” And while security has been thrust center stage in all arenas, from healthcare to ecommerce to highereducation, there are

Last month, the Federal Bureau of Investigation (FBI) was ordered to reveal the complete source code for the TOR exploit it used to hack visitors of the world’s largest dark web child pornography site, PlayPen. Robert J. Bryan, the federal

Security researchers have discovered a remotely exploitable vulnerability in Called ID app “Truecaller” that could expose personal details of Millions of its users. Truecaller is a popular service that claims to “search and identify any phone number,” as well as

Microsoft’s self-professed love for Linux seemingly has no bounds. According to a session description from the company’s Build 2016 developer conference which leaked overnight, Microsoft is planning to show off Bash running on Ubuntu Linux on Windows during this week’s

The government will drop its case against Apple after it was able to successfully crack an iPhone 5c used by one of the San Bernardino shooters, Syed Rizwan Farook staving off at least temporarily a showdown, which privacy advocates have