Archive

OVER 30 HIGH school students debated the pros and cons of surveillance in the post-Snowden world on Capitol Hill on Wednesday, the culmination of a 2016 competitive debate season that saw nearly 20,000 young people across the country dissect the topic with more

When you really need to keep your files safe and secure, you need encryption. We’ve covered the basics before, and even rounded up your favorite encryption tools, but today we’re putting two of the most popular options for Windows head

Remote attackers have been shut out of the IPsec code of Cisco Adaptive Security Appliance (ASA) Software following Tuesday’s release of a patch, according to a Cisco security advisory. The incursion could have allowed attackers to alter a memory block, which subsequently

Next time you exercise with your Fitbit wristband, you should know that the readings by your health band may be off by some degree. Fitbit wearables are pretty popular among the health conscious gen users and among the largest selling brand

Researchers from Princeton University have found a new technique that is used to take privacy away from internet users. In the study, the Princeton researchers carried out a privacy survey of the Alex top one million web sites, and discovered

Tech support scammers are upping their game, actively using malware to cause computer technical issues— effectively holding devices for ransom and forcing consumers to call a fake support number, which opens them up to identity theft and future credit problems. Malwarebytes

The FBI has been in the hacking business for a long time, famously using malware to log suspects’ keystrokes as early as the 1990s. But in the high-profile case surrounding a dark web child abuse site called Playpen, the Bureau

An exploit which can lead to completely hijacked network devices is being used in fresh campaigns against Ubiquiti Networks. In a post on the Ubiquiti community forum, the company said it had received several reports of infected airOS M devices

NSA whistleblower Edward Snowden has joined a number of privacy experts in calling on Google to enable end-to-end encryption by default in its new Allo messaging app. In a tweet, Snowden said Google’s decision has made the app “dangerous” to

MANILA, Philippines – Daily hacker attacks have forced the continued shutdown of the website of the House of Representatives as Congress prepares for the canvassing of votes for president and vice president this week. Sources from the House said the

Back in 2012, LinkedIn had a pretty major data breach in which hackers were thought to have nabbed around 6.5 million users’ passwords. It turns out the number was much higher than originally suspected. According to a blog post from

Do you remember Algerian hacker Hamza Bendelladj who was arrested in Malaysia for hacking into banks and donating a large amount of money to Palestinian charities? Well, he’s in prison nowbut there’s another good hacker who has been hacking and

Over the past two years, a group of cybercriminals has infected almost 1 million computers with malware that hijacks search results, even when they’re served over encrypted HTTPS connections. The click-fraud botnet earns its creators money through Google’s AdSense for

WASHINGTON, D.C. (NEWS10) — Senator Chuck Schumer is proposing new cybersecurity measures to protect Upstate New Yorkers from Russian hackers. Senator Schumer says the real danger is the growing threat of ‘ransomware’, an insidious type of malware that encrypts, or

Health and medical associations are tempting targets for hackers, and that’s been made more than clear today, with not one, but two different hospitals suffering from data breaches. In Michigan, an attack on Complete Chiropractic & Bodywork Therapies has suffered

Perth Uber driver, Mike Oze-Igiehon, is suing Uber in the District Court for damages after it terminated his contract. The outcome of this case may shed some light on status of drivers in the eyes of the law. The main