Archive

ISLAMABAD (Reuters) – Pakistan has adopted a much-criticised cyber security law that grants sweeping powers to regulators to block private information they deem illegal. The National Assembly approved the Prevention of Electronic Crimes Bill 2015 late on Thursday after the

The website of the organization that oversees competitive swimming in Australian has come under cyber attack, allegedly in connection with an Australian swimmer calling a Chinese competitor at the Rio de Janeiro Olympics a “drug cheat,” according to a report.

Google released two new security features that attempt to make Gmail safer for users. The updates, announced Wednesday, will benefit Gmail users on the web or Android. If users receive a message that can’t be authenticated, the search giant will

As well as a great opportunity to spy on some of the most talented security researchers, hacking conferences are naturally a hotbed for those looking to get up to a bit of mischief. Newly published data suggests a load of

Two researchers operating under aliases (my123 and slipstream) this week posted a report—accompanied by a relentless chiptune—that reveals how Microsoft inadvertently published a Secure Boot policy that acts as a backdoor that allows for the UEFI firmware feature to be

Fiat Chrysler Automobiles may not be the only automaker with hacking vulnerabilities to worry about as a new report suggests that over 100 million Volkswagens are susceptible to remote hacking. A lengthy report compiled by four security experts from the

Security experts have discovered a malware platform that’s so advanced in its design and execution that it could probably have been developed only with the active support of a nation state. The malware—known alternatively as “ProjectSauron” by researchers from Kaspersky

In action five years, highly selective threat actor has only been known to compromise seven organizations. Symantec has discovered a previously unknown cyberespionage group so selective in its targets that it is only known to have compromised seven organizations and

Two men jailed in Houston and accused of using pirated computer software to steal more than 100 vehicles may have exploited an electronic vulnerability to advance auto theft into high-tech crime. Michael Arce, 24, and Jesse Zelaya, 22, focused on

We think of our monitors as passive entities. The computer sends them data, and they somehow—magically?—turn it into pixels which make words and pictures. But what if that wasn’t the case? What if hackers could hijack our monitors and turn

With IT spending in the Middle East projected to reach US $212.9 billion in 2016, a 3.7 percent increase from 2015, GITEX Technology Week as largest regional IT exhibition will play a more significant role in 2016 than ever before.

Those of you with a Yahoo account may want to reset your password, as the hacker behind the recent MySpace and LinkedIn data dumps is claiming that he has the details of 200 million Yahoo accounts. He’s ready to sell

Another year, another Black Hat, another Jeep steered into a ditch next to a cornfield. Last July, you might recall how automotive cybersecurity researchers Charlie Miller and Chris Valasek remotely hijacked the digital systems of a Jeep Cherokee from 10

Iranian hackers have compromised more than a dozen accounts on the Telegram instant messaging service and identified the phone numbers of 15 million Iranian users, researchers have found. The attacks, which took place this year, jeopardised the communications of activists,

Password managers are a wise way to manage large volumes of login credentials in a safe way. The applications generate strong passwords for new web services and securely store them. But if a password manager has software vulnerabilities, it could

LAS VEGAS – Credit card companies for the most part have moved away from “swipe and signature” credit cards to chip and pin cards by this point; the technology known as EMV (Europay, MasterCard, and Visa) which is supposed to