06 Nov

Telegram – What Parents Need To Know Now

If you hadn’t heard of Telegram till 2021 then you wouldn’t be alone. This relatively unknown messaging and social media platform has risen from relative

Author rabih
06 Nov

Teen Slang and Texting Acronyms Parents Should Know

If you pick up your teen’s phone on any given day, chances are the next stop you make will be Google. That’s because, if you’re

Author rabih
05 Nov

Reg reader returns Samsung TV after finding giant ads splattered everywhere

A Register reader triggered a kerfuffle for Samsung after asking the electronics biz if he could disable large and intrusive adverts splattered across his new

Author rabih
05 Nov

No day in court: US Foreign Intelligence Surveillance Court rulings will stay a secret

The US Supreme Court this week refused [PDF] to hear a case that would have forced the country’s hush-hush Foreign Intelligence Surveillance Court (FISC) to

Author rabih
05 Nov

Reward! Uncle Sam promises $10m for info about DarkSide ransomware gang chiefs

US authorities are dangling a $10m reward for information on the DarkSide gang, while Interpol says half a dozen people were arrested in Ukraine on

Author rabih
05 Nov

Labour Party supplier ransomware attack: Who holds ex-members’ data and on what legal basis?

Mystery surrounds the Labour Party ransomware attack, with former party members who left years ago saying their data was caught up in the hack –

Author rabih
05 Nov

Beijing fingers foreign spies for data mischief, with help from consulting firm

China’s Ministry of State Security released details this week of three alleged security breaches that saw sensitive data illegally transferred abroad. State-sponsored Xinhua News Agency

Author rabih
04 Nov

Google squashes Android zero‑day bug exploited in targeted attacks

Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes Google has released its monthly round of

Author rabih
04 Nov

FYI: Code compiled to WebAssembly may lack standard security defenses

WebAssembly has been promoted for its security benefits, though researchers in Belgium and New Zealand contend applications built in this binary format lack important protections.

Author rabih
04 Nov

Beijing lashes USA’s China Telecom ban – but quite gently

China’s Ministry of Industry and Information Technology has responded with mild indignation to the USA’s decision to revoke the operating licence that allowed China Telcom

Author rabih
03 Nov

US Dept of Commerce sanctions NSO Group, Positive Technologies, other makers of snoopware

The US government’s Dept of Commerce on Wednesday sanctioned four companies in Israel, Russia, and Singapore for selling software used to break into computer systems

Author rabih
03 Nov

Microsoft rolls out $3-a-user Defender for small biz types

Ignite Sniffing the wind after the large uptick in ransomware attacks across the corporate world, Microsoft said it plans to roll out a new Defender

Author rabih
03 Nov

Squid Game Cryptocurrency Scam Cheats Investors, Serves as a Warning

It’s little surprise that a digital currency scam based on the popular Squid Games series on Netflix is making the news.   If you haven’t caught wind of it yet,

Author rabih
03 Nov

BlackMatter ransomware gang says it’s disbanding – again – after Ukraine arrests

A member of the BlackMatter (aka Darkside) ransomware gang has publicly claimed the extortionists are shutting down, causing much excitement within the infosec world. A

Author rabih
03 Nov

Locked up: UK’s Labour Party data ‘rendered inaccessible’ on third-party systems after cyber attack

The UK’s Labour Party, the official opposition to the country’s ruling Conservatives, has suffered a humiliating data breach. Members of the party were sent notice

Author rabih
03 Nov

UK data spillers fined, but enforcement slows: £5m in ICO penalties not yet paid

More than half of data protection fines issued by the Information Commissioner’s Office over the last two years, totalling more than £5m, have not been

Author rabih
03 Nov

Privacy-Enhancing Cryptography to Complement Differential Privacy

Credit: metamorworks/shutterstock.com In previous posts we discussed many aspects of differential privacy: what it is, what it is useful for, and how it is applied

Author rabih
03 Nov

What’s it like to work as a malware researcher? 10 questions answered

Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field Just days ago,

Author rabih
Load moreLoadingAll items loaded