Drive-by attack relies on hacked GoDaddy accounts

Hundreds of hacked domain name accounts registered through GoDaddy are being used as part of a highly effective campaign using the Angler exploit kit to infect computers with malware.

By Jeremy Kirk | 04 March, 2015 13:34

Tags: Cisco Systems, security, GoDaddy, malware

FREAK is another serious flaw in the Web's encryption

Experts are warning of a serious security flaw that has apparently gone undetected for years and can weaken encrypted connections between computers and websites, potentially undermining security across the Internet.

By Jeremy Kirk | 04 March, 2015 11:15

Tags: Apple, Google, security, encryption, Exploits / vulnerabilities

Snowden willing to face trial in US, if it's fair

Edward Snowden, the former U.S. National Security Agency contractor who leaked details of the agency's surveillance programs, is willing to return to the U.S. and face criminal charges, if he's assured of a fair trial, according to a Russian news report.

By Grant Gross | 04 March, 2015 08:41

Tags: U.S. Department of Justice, security, Edward Snowden, legal, U.S. National Security Agency, Eric Holder, government, privacy, Anatoly Kucherena, Criminal

Privacy advocates find Obama proposal lacking

A consumer privacy proposal from U.S. President Barack Obama's administration gives people too little control over their personal data and companies too much latitude to use that information, a coalition of 14 privacy and digital rights groups said.

By Grant Gross | 04 March, 2015 06:52

Tags: Association of National Advertisers, legislation, Barack Obama, internet, privacy, Electronic Frontier Foundation, Public Knowledge, erin Szoka, Susan Grant, Jeffrey Chester, security, TechFreedom, Center for Democracy and Technology, government, Dan Jaffe, Consumer Federation of America, U.S. Federal Trade Commission, Consumer Watchdog, U.S. White House, regulation

Android users spammed with fake Amazon gift card offers

New malware spreading across Android devices via text messages promises free Amazon gift cards but delivers only spam to everyone on the device's contact list.

By Joab Jackson | 04 March, 2015 06:47

Tags: AdaptiveMobile, security, malware

EU data protection reform 'badly broken,' civil liberty groups warn

Leaked documents show that the European Union's data protection is on its way to become an empty shell devoid of meaning, European civil rights groups warned Tuesday.

By Loek Essers | 04 March, 2015 01:00

Tags: Council of the European Union, regulation, security, legislation, government, data protection, privacy

China defends cybersecurity demands, amid complaints from U.S.

President Barack Obama isn't happy with new rules from China that would require U.S. tech companies to abide by strict cybersecurity measures, but on Tuesday the country was quick to defend the proposed regulations.

By Michael Kan | 03 March, 2015 20:26

Tags: regulation, security, government

iPhone theft victims tricked into unlocking devices

It seems there can be further indignity foisted onto people who've had their iPad or iPhone stolen.

By Jeremy Kirk | 03 March, 2015 15:04

Tags: Apple, symantec, security

Data retention: Government agrees to detail data set in legislation

The government has agreed to set out in its data retention bill exactly what customer data telecommunications carriers and Internet service providers will need to store.

By Rohan Pearce | 03 March, 2015 14:50

Tags: civil liberties, data retention, data retention plan, privacy

Is data on your new Lollipop Android device encrypted? Maybe not

Some smartphone manufacturers are not configuring devices running the latest version of Android to automatically encrypt personal data, which Google had said would scramble data by default.

By Jeremy Kirk | 03 March, 2015 14:09

Tags: Motorola, Android OS, Google, security, Samsung Electronics, encryption

D-Link patches router, says more fixes are on the way

D-Link issued fixes on Monday for flaws that could allow remote access to one of its routers, and will patch several other models in the coming week.

By Jeremy Kirk | 03 March, 2015 10:55

Tags: security, D-Link, Exploits / vulnerabilities

NTT buys Germany's biggest datacentre provider for $US840 million

Japan's NTT Group is buying a majority stake in Germany's biggest provider of datacentre services, the latest sign of convergence in a competitive European market.

By James Niccolai | 03 March, 2015 08:43

Tags: e-shelter, services, NTT Communications, outsourcing, Hosted, Computing services

Conn. AG launches Lenovo-Superfish 'crapware' probe

Three days after Chinese computer maker Lenovo promised to flush "crapware" from its consumer PCs, Connecticut's state attorney general announced a probe into the company's practice of bundling adware.

By Gregg Keizer | 03 March, 2015 08:22

Tags: Malware & Vulnerabilities, antispam, security, Lenovo, three

7 warning signs an employee has gone rogue

For all the emphasis on tools and gizmos, IT is still very much about the people who develop and use said tools and gizmos. Collaboration, mutual respect, passion for the work -- all this and more are essential to a beneficial outcome, whether your IT group is shipping code, swatting bugs, working with business users, or securing company systems.

By Roger A. Grimes | 03 March, 2015 06:09

Tags: security, None, IT management

Europe's political youth organizations demand strict net neutrality rules

European political youth organizations have demanded that European countries draft strict and clear net neutrality rules that prevent ISPs from discriminating against certain Internet traffic.

By Loek Essers | 03 March, 2015 03:24

Tags: Council of the European Union, regulation, european commission, legislation, government, internet, European Parliament

Mozilla scrubs Superfish certificate from Firefox

Mozilla has released an update to Firefox that erases the self-signed digital certificate implanted by Superfish, the vulnerable adware that blew up in Lenovo's face a week and a half ago.

By Gregg Keizer | 03 March, 2015 01:59

Tags: Firefox, security, Lenovo

Finnish companies join forces to build secure OS for smartphones and tablets

Finnish companies Jolla and SSH Communications Security are counting on their European origins to help sell a secure mobile operating system they are co-developing.

By Mikael Ricknäs | 03 March, 2015 00:07

Tags: consumer electronics, security, mobile security, smartphones, hardware systems, SSH Communications Security, tablets, encryption, Jolla, MWC

DoCoMo app shares SIM credentials with offline devices

Japanese mobile carrier NTT DoCoMo has developed an app that can wirelessly send authentication credentials to devices that are not connected to the Internet, allowing more hardware to get online or query the cloud.

By Tim Hornyak | 02 March, 2015 22:51

Tags: NTT DoCoMo, MWC, consumer electronics, security, Access control and authentication, qualcomm, mobile

NSA authorization to collect bulk phone data extended to June 1

A U.S. secret court has extended until June 1 the controversial bulk collection of private phone records of Americans by the National Security Agency.

By John Ribeiro | 02 March, 2015 16:24

Tags: security, U.S. National Security Agency, Foreign Intelligence Surveillance Court, privacy

How a Blu-ray disc could install malware on your computer

A pair of vulnerabilities found in hardware and software for playing Blu-ray discs might come in handy for secret snooping by the U.S. National Security Agency.

By Jeremy Kirk | 02 March, 2015 14:20

Tags: security, NCC Group, Exploits / vulnerabilities

Top Whitepapers

Twitter Feed

Featured Whitepapers