Archive

Claims that we’re all vulnerable to targeting by cybercriminals have become part of conventional wisdom, but one security expert believes there’s a way to keep yourself off the radar. The Turnbull government’s first Budget reinforced the top-level agenda around cybersecurity

One of the best problems in computer science is randomness. Random numbers underlie so much of what we do with computers, from the simplest games to the most advanced cryptography, yet computers are by definition/design non-random. Computers are deterministic—for most

WASHINGTON — Cyrus R. Vance Jr., the district attorney of Manhattan, visited Washington late last month to argue his case on a pressing issue: encryption. In a string of meetings with members of Congress, Mr. Vance told centrallawmakers that encryption

Two-thirds of big businesses in the United Kingdom have experienced a cyber attack in the last year, according to the government’s Cyber Security Breaches Survey, the BBC reported. The attacks mostly came from malware, viruses or spyware. A quarter of

While Tesla is undeniably hastening the adoption and popularity of electric vehicles, the company is also pushing the envelope as it pertains to self driving cars. Indeed, Tesla’s suite of autonomous driving technologies is one of the more impressive features

A 10GB file has been published online that purports to hold sensitive financial data compromised from a bank in the United Arab Emirates (UAE). Based on initial analysis of the leaked dataset, the Zip file contains sensitive financial information on

LOS ANGELES (AP) — The man who claimed to be the mysterious founder of bitcoin appears to be stepping back into the shadows, leaving numerous questions in his wake. Three days after Australian entrepreneur Craig Wright came forward as “Satoshi

Hackers last year quietly stole a database containing the details of over 57 million people. The breach has only come to light this week, after the stolen data was put up for sale on the dark web. The breach data

Google software engineer Milinda Perera said this week that the company is now rolling out an HTTPS version of every single blog stored away on the Blogspot domain. That means visitors can load up their favorite blog on this specific

The PCI Security Standards Council (PCI SSC) has released the latest version of the PCI Data Security Standard. Version 3.2 includes requirements that merchants and banks must deploy in strong encryption and multi-factor authentication, as well as when those changes

IT managers know the movies get it wrong. A teenager with a laptop cannot crack multiple layers of encryption — unless that laptop is connected to a supercomputer somewhere and the teenager can afford to wait a few billion years.

Privacy Shield, the proposed replacement to the now-invalid US-EU data exchange agreement Safe Harbour, may end up the prominent casualty of a relatively obscure US supreme court action last week. The court’s action, in the form of an amendment to

We are still in the early days of the Internet of Things (IoT). Rapid innovation is happening constantly in nimble startups, but many potential enterprise creators of IoT products seem to be stalling. Why? Corporate leadership teams are avoiding two

Sen. Ron Wyden (D-Ore.) is planning to introduce legislation to reverse proposed amendments to Rule 41 within days, an aide to Sen. Wyden told SCMagazine.com. The amendments to Rule 41, which governs criminal procedure, were adopted by a Supreme Court

There is a newly discovered hacking group that has been spying on governments in the Asian region since 2009. The group has been unveiled in Microsoft’s latest Security Intelligence Report (SIR), which you can download on this link. Announcing the

According to a security firm, a Russian man has allegedly hacked into 272 usernames and passwords on popular email sites Gmail, Yahoo and Hotmail. They are allegedly being traded in Russia’s criminal underground. Human Rights Foundation Chairman Garry Kasparov told