27 Jun

5 ways cybercriminals steal credit card details

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

Author rabih
27 Jun

Beijing probes security at academic journal database

China’s internet regulator has launched an investigation into the security regime protecting academic journal database China National Knowledge Infrastructure (CNKI), citing national security concerns. In

Author rabih
27 Jun

Singapore promises ‘brutal and unrelentingly hard’ action on dodgy crypto players

In the same week that it welcomed the launch of a local center of excellence focused on crypto-inspired central bank digital currencies, Singapore’s Monetary Authority

Author rabih
25 Jun

We’re now truly in the era of ransomware as pure extortion without the encryption

Feature US and European cops, prosecutors, and NGOs recently convened a two-day workshop in the Hague to discuss how to respond to the growing scourge

Author rabih
24 Jun

More than $100m in cryptocurrency stolen from blockchain biz

Blockchain venture Harmony offers bridge services for transferring crypto coins across different blockchains, but something has gone badly wrong. The Horizon Ethereum Bridge, one of

Author rabih
24 Jun

Google: How we tackled this iPhone, Android spyware

Spyware developed by Italian firm RCS Labs was used to target cellphones in Italy and Kazakhstan — in some cases with an assist from the

Author rabih
24 Jun

Does an iPhone Need Antivirus Software?

If you’re one of the countless Apple iPhone owners out there, there’s a good chance that one of the reasons you love your smartphone is

Author rabih
24 Jun

Beijing-backed attackers use ransomware as a decoy while they conduct espionage

A state-sponsored Chinese threat actor has used ransomware as a distraction to help it conduct electronic espionage, according to security software vendor Secureworks. The China-backed

Author rabih
24 Jun

NSO claims ‘more than 5’ EU states use Pegasus spyware

NSO Group told European lawmakers this week that “under 50” customers use its notorious Pegasus spyware, though these customers include “more than five” European Union member

Author rabih
23 Jun

$6b mega contract electronics vendor Sanmina jumps into zero trust

Matt Ramberg is the vice president of information security at Sanmina, a sprawling electronics manufacturer with close to 60 facilities in 20 countries on six

Author rabih
23 Jun

Online Safety for Seniors – How to Keep Older Family Members Safe Online

Heard of the sandwich generation? Well, if you’ve got a tribe of kids and parents who are aging then you are a fully-fledged member! And

Author rabih
23 Jun

Identity and Access Management at NIST: A Rich History and Dynamic Future

Digital identity for access control is a fundamental and critical cybersecurity capability that ensures the right people and things have the right access to the

Author rabih
23 Jun

Halfords suffers a puncture in the customer details department

UK automobile service and parts seller Halfords has shared the details of its customers a little too freely, according to the findings of a security

Author rabih
23 Jun

Don’t ditch PowerShell to improve security, say infosec agencies from UK, US, and NZ

Windows PowerShell is enormously useful, extremely prevalent, and often targeted by crooks because it offers an express route into the heart of Windows servers and

Author rabih
23 Jun

Europol arrests nine suspected of stealing ‘several million’ euros via phishing

Europol cops have arrested nine suspected members of a cybercrime ring involved in phishing, internet scams, and money laundering. The alleged crooks are believed to

Author rabih
22 Jun

Mega’s unbreakable encryption proves to be anything but

Mega, the New Zealand-based file-sharing biz co-founded a decade ago by Kim Dotcom, promotes its “privacy by design” and user-controlled encryption keys to claim that

Author rabih
22 Jun

Cisco warns of security holes in its security appliances

Cisco has alerted customers to another four vulnerabilities in its products, including a high-severity flaw in its email and web security appliances.  The networking giant

Author rabih
22 Jun

Israeli air raid sirens triggered in possible cyberattack

Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some

Author rabih
Load moreLoadingAll items loaded