28 Feb

Conti ransomware gang leak: 60,000 messages online

Activists have reportedly leaked the contents of internal chats from the Russia-affiliated Conti ransomware gang as the Ukraine war continues. Leaked after the extortionists vowed

Author rabih
28 Feb

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)

Seems like the internet follows us wherever we go nowadays, whether it tags along via a smartphone, laptop, tablet, a wearable, or some combination of

Author rabih
28 Feb

#ShieldsUp – Now is the time to double‑check cybersecurity processes and operations

As the conflict in Ukraine heightens the risk of cyberattacks globally, what can organizations do to improve their resiliency? Due to the current attack by

Author rabih
28 Feb

Russia is the advanced persistent threat that just triggered. Ready?

Opinion Stress-testing security is the only way to be sure it works. Until then, the worst security looks much the same as the best. As

Author rabih
28 Feb

Tech world’s Ukraine response mixes evacuation efforts, ad bans, free phones, infosec FUD

As Russia’s invasion of Ukraine continues, the technology industry is trying to use its services to make a difference – and to keep those services

Author rabih
26 Feb

Data stolen from Nvidia, blueprints leak threatened

In brief Nvidia is probing a cyberattack caused outages within its internal network. It’s said that email and developer systems were knocked over during the

Author rabih
26 Feb

Nvidia probes cyberattack on internal systems

In brief Nvidia is probing what may be a ransomware infection that caused outages within its internal network. The malware is said to have taken

Author rabih
25 Feb

Ukraine seeks volunteers to defend networks as Russian troops menace Kyiv

As the Russian invasion of Ukraine continues, the latter’s government is reportedly seeking cybersecurity volunteers to help defend itself. Meanwhile, Russia’s CERT has warned critical

Author rabih
25 Feb

The Wearable Future Is Hackable. Here’s What You Need To Know

Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296 million watches congrats, you’re smarter

Author rabih
25 Feb

Why Am I Getting All These Notifications on my Phone?

Authored by Oliver Devane and Vallabh Chole   Notifications on Chrome and Edge, both desktop browsers, are commonplace, and malicious actors are increasingly abusing this feature.

Author rabih
25 Feb

UK Computer Misuse Act reformers visit Parliament

Infosec researcher Rob Dyke, best known to Reg readers for fending off legal threats from not-for-profit open-source foundation Apperta after finding a data breach, has

Author rabih
25 Feb

The past is present: Riffing on a cybersecurity­appropriate tune for Black History Month

What can social movements of the past teach you about the future – and about protecting your digital self? Being African American and working at

Author rabih
25 Feb

When it comes to software pipelines, zero days shouldn’t mean zero productivity

Webinar DevOps and continuous delivery have revolutionized software development and productivity over the last decade. But as robust and resilient as today’s development pipelines are,

Author rabih
24 Feb

Cyberwarfare looms as Russia shells, invades Ukraine

Analysis Russia’s invasion of Ukraine has cleared the way for a new battlefront with the West in cyberspace, with experts warning of an escalation in

Author rabih
24 Feb

BlueVoyant pulls in another $250m in venture funding

Cybersecurity firm BlueVoyant has taken $250m in a fresh funding round announced this week, pushing the company’s valuation past the $1bn mark. BlueVoyant is led

Author rabih
24 Feb

Cloudflare buys anti-phishing business Area 1 for $162m

Krazy Glue of the internet Cloudflare has buffed up its email security with the purchase of anti-phishing firm Area 1. Area 1 Security is all

Author rabih
24 Feb

WhatsApp è sicura per i bambini? Cosa devono sapere i genitori

We may be talking about the TikTok app in our public circles, but there’s another app — just as widely used — that kids are

Author rabih
24 Feb

McAfee 2022 Consumer Mobile Threat Report

We’re excited to bring you the latest edition of the McAfee 2022 Consumer Mobile Threat Report. After all, when you know the challenges you face,

Author rabih
Load moreLoadingAll items loaded