Archive

For cryptocurrency enthusiasts seeking mainstream adoption, events like this are so unhelpful. Hackers appear to have made off with the equivalent of $2 million in digital currencies from Gatecoin, according to a notice posted on the exchange’s website. The Hong Kong-based

Algorithms are boring until your life depends on them. People with Type 1 diabetes use algorithms all day long. They perform mental calculations to manage their blood-sugar levels, which are measured by hand with a finger prick, or with a

Virtual reality is the latest battlefield in the war against digital piracy, as Oculus Rift is now more vulnerable to illegal software. In April, a piece of independent software called Revive was released, allowing Oculus-exclusive games to run on rival

Quite literally, every day someone gets hacked. Whether that’s a telecommunications company having its customer data stolen, or another chain of businesses being ripped for all the credit cards it processes, today one hack just seems to melt into another.

Apple CEO Tim Cook touched on encryption and cybersecurity during a weekend discussion with Indian Prime Minister Narendra Modi. “The Prime Minister explained his Digital India initiative, and identified three key objectives of Digital India as e-education, health and increasing

A bipartisan pair of lawmakers are encouraging their colleagues to use end-to-end encryption to communicate. “There are a number of easy-to-use applications that have end-to-end encryption for mobile communications. While this method is not foolproof, the use of these apps

For decades, encryption was an arcane art. Encryption was slow, clunky and highly complex, and as a result, the vast majority of data in the data center resides on storage systems in the clear. Sensitive data has historically been protected by

A student from the University of Maribor in Slovenia has ended up with a prison sentence after finding cryptographic flaws in the country’s implementation of its secure communications system, known as TETRA. TETRA is short for Terrestrial Trunked Radio, a

Security industry types and leaker Edward Snowden have rubbished new Google instant messenger app Allo after its lead product engineer revealed it would not run end-to-end encryption by default. The text-based messaging service launched at Google’s I/O 2016 gabfest last

reEye (FEYE) researchers say a series of cyberattacks on Middle Eastern banks isn’t related to an earlier digital heist of Bangladesh Bank that netted $81 million, but didn’t say whether it has ties to similar assults on banks in Ecuador

Michigan-based Complete Chiropractic and Bodywork Therapies has notified patients of a possible PHI data breach after a server was accessed by an unauthorized entity. According to the OCR’s data breach portal, approximately 4,082 individuals were affected by the healthcare data

Malware is infiltrating mobile devices at an increasing rate, often bringing user productivity to a halt and opening businesses and individuals up to a potentially costly and devastating risk for breach. According to Kaspersky Lab, the volume of malware targeting

You need to know about this serious online security threat. We recently told you about an emergency security patch for Adobe Flash that dealt with a zero-day vulnerability. That means hackers found the security weakness before Adobe did. While Adobe

Scammers who pretend to be tech support fromMicrosoft are using tips out of the ransomware playbook to fleece people, according to new research. According to Jerome Segura, lead malware intelligence analyst as Malwarebytes, scammers are now using screen locking malware

The Federal Bureau of Investigation has been sneaking surreptitious code onto computers for years as part of its inquiries. This software is often referred to as “malware,” a portmanteau of “malicious” and “software,” because targets don’t know that they’ve downloaded the

Web/Chrome/Android/iOS: We’ve shown you how to encrypt your email with PGP, but it can be daunting to get started with. Passlok is a webapp, mobile app, and Chrome app that makes the process easy, and there’s a Chrome extension that