Security as a condition is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. Establishing or maintaining a sufficient degree of security is the aim of the work, structures, and processes called "security.
All stories in Security
-
New patent hints at ‘Wrist ID’ for Apple Watch
Apple has filed a new patent that could lead to Wrist ID appearing on its Watch. All we can do is wait, hope, and pray that ...
-
Pardon the Intrusion #34: Cyberbaddies had a field day in 2020
The en masse shift to remote work in 2020 and the race to find a vaccine created unique threats in cyberspace, allowing criminals ...
-
Pardon the Intrusion #33: SolarWinds unleashes a cyber storm
Attackers turned out to SolarWinds to inject malicious code into its monitoring tool that was then pushed to nearly 18,000 ...
-
Snowden warns: The surveillance states we're creating now will outlast the coronavirus
Governments around the world are using high-tech coronavirus surveillance measures to combat the outbreak. But are they worth ...
-
Pardon the Intrusion #32: When an exploit becomes a work of art
Google Project Zero have been adept at finding security flaws, but this impressive new disclosure from Ian Beer beats everything ...
-
Can we really trust the Cloud with our data?
It would be great if there were an easy yes or no answer. But it was never going to be that simple. The truth is, it ...
-
Why AI is the future of home security
The future of home security is going to involve a lot of AI and cloud computing — in this piece we explain what you can ...
-
Study: Security flaw could allow hackers to trick lab scientists into making viruses
Cyber-security researchers from Ben-Gurion University of the Negev recently discovered a computer attack that could allow ...
-
Pardon the Intrusion #31: Stop using "123456" as your password
The list of worst passwords for 2020 is here, and it's every bit awful as you would expect: "123456," "123456789," "picture1," ...
-
Pardon the Intrusion #30: Your data is up for sale
India's COVID-19 contact tracing app comes under scrutiny again over its conception, including details of private sector ...
-
Pardon the Intrusion #29: Ransomware gang turns Robin Hood
Airtel kicks up a storm after its privacy policy allowed it to collect users' sexual orientation, genetic information, political ...
-
Pardon the Intrusion #28: Your 2FA phone got stolen. Now what?
Losing your 2FA phone can be a frustrating experience. But it doesn't have to be. Here's what you can do to quickly recover ...
-
Facebook now has a loyalty program for its bug bounty hunters on its platform
Facebook launched its bug bounty program in 2011. Now, the company is bringing an intriguing update to it with a loyalty ...
-
Pardon the Intrusion #27: The first death directly linked to ransomware
Password fatigue is real — but password managers or single sign-ons (SS0) can take away the chore of having to recollect ...
-
Why were the NBA and Walmart using Clearview AI?
A leaked list of Clearview clients shows the facial recognition software has spread beyond law enforcement into companies ...
-
This sex toy's security flaw could literally cockblock you for life
Chastity belts have been around for centuries. If you go to sex museums around the world, you'll see different kinds of devices with ...
-
How UX designers can save us from our own shitty passwords
In 2019, cybercrime cost businesses more than $2 trillion globally. With the influx of digital products, more and more people ...
-
Majority of Europeans would consider human augmentation, study finds
Almost two-thirds of Europeans would consider human augmentation, but the north is far more enthusiastic than the south, ...
-
Pardon the Intrusion #26: Facial recognition? That's a no from me, dog
Portland, Oregon has become the first US city to ban the use of facial recognition tech by both public and private businesses. ...
-
Pardon the Intrusion #25: Ransomware goes pro
Ransomware is quickly shaping up to be one the most significant online security threats of our era. And there's no end in ...
-
Pardon the Intrusion #24: The clock is TikToking
TikTok is facing a roadblock in the US, where the Trump administration has escalated its threats to ban the app along with ...
-
Pardon the Intrusion #23: Read this if you have a wearable
GPS and fitness-tracking company Garmin became the latest in a long list of firms that have become victim to a ransomware ...
-
Dutch researchers are developing quantum technology to secure your bank account
With high speed 5G wireless networks and quantum computers on the horizon, everyone’s personal data is becoming ever more ...
-
Moving Tiktok’s ownership to Microsoft will benefit tech giants — not users
In what seems to be a common occurrence, Chinese video-sharing app TikTok is once again in the headlines. After months ...
-
Pardon the Intrusion #22: Twitter just had its most serious hack
Bitcoin scammers struck gold by hijacking several verified Twitter accounts in one of the most catastrophic security breach to ...
-
UK bans Huawei from 5G network, citing security risks triggered by US sanctions
Britain has announced it's banning Huawei from the country's 5G network, mere months after agreeing to keep the firm as ...
-
Google-backed Indian delivery startup Dunzo suffers data breach
Google-backed Indian hyperlocal delivery service Dunzo said it suffered a data breach that left customer data including email ...
-
Here’s how to manage your remote worker’s device security
One of the biggest consequences of COVID-19 for enterprises beyond 2020 will be the acceleration of the trend to working ...
-
The evolution of home security — and the latest trends keeping us safe
If you had to render an opinion, would you say the world is a more or less dangerous place today than it was, say, ten years ...
-
Pardon the Intrusion #21: What does the privacy label say?
Apple has introduced a new privacy-focused "nutrition label" for third-party apps that clearly describe how apps use your ...
-
Pardon the Intrusion #20: SMS authentication needs to go
Relying on SMS for two-factor authentication can also have unintended consequences, with no means to retrieve OTP codes during ...
-
Pardon the Intrusion #19: Paying for Privacy
Zoom confirmed that it plans to offer stronger encryption features only for its paying users. It won't be extended to the ...
-
7 ways to keep your personal information safe during protests
Protesting in the United States, and in many countries around the world, is a legally protected right — theoretically. ...
-
Pardon the Intrusion #18: Marcus Hutchins, the ransomware hero
The US Senate voted to reauthorize the USA Freedom Act, allowing law enforcement to collect Americans' browsing and internet ...
-
Pardon the Intrusion #17: Hands up, this is a hold-up
The coronavirus outbreak has proven to be an excellent opportunity for criminals to target hospitals, schools, and local ...
-
Trump extends the Huawei ban to 2021
In case you were hoping the Donald Trump's government would ease its restrictions on Huawei anytime soon, I've got some bad ...
-
Researchers used AI to crack Microsoft Outlook's CAPTCHA
Not only are they super annoying, but it turns out text-based CAPTCHAs are also potentially a security risk — even those ...
-
Microsoft open-sources its coronavirus threat data for security researchers
For the last couple of months, cybercriminals have taken advantage of the coronavirus pandemic to launch a series of attacks ...
-
GitHub bolsters code security with advanced scanning and private instances
GitHub today announced that it's bolstering its security solutions by offering GitHub Advanced Security and Private Instances ...
-
Pardon the Intrusion #16: Phishing in the time of COVID-19
Subscribe to this bi-weekly newsletter here! Welcome to the latest edition of Pardon The Intrusion, TNW’s bi-weekly ...
-
Zoom’s 5.0 update helps stop zoombombing and improves encryption
Zoom today announced its 5.0 update, adding some of the security updates the company has promised since the software shot ...
-
India wants to build an ultra-intrusive ‘wristband’ to track coronavirus patients’ every move
After launching its coronavirus contract tracing app, Aarogya Setu, earlier this month, India is preparing to introduce smart ...
-
Pardon the Intrusion #14: There is some honor among thieves
Use of surveillance to fight coronavirus raises has raised concerns about government overreach after pandemic dies down.
-
Facebook tests security measures by cloning itself and setting bots free
In a parallel social network hidden from prying eyes, an army of Facebook bots is abusing the platform to find hidden security ...
-
Ford and VW's top selling cars can be hacked
A British consumer magazine is accusing Ford and Volkswagen of being careless with the digital security of their cars' connected ...
-
Pardon the Intrusion #15: Zooming out
Video conferencing platform Zoom's moment in the spotlight has been marred by a string of privacy blunders, security woes ...
-
Zoom sued by shareholder after security issues tanked its stock price
Just when it looked like Zoom's getting its act together, the company's troubles got bad to worse. Yesterday, one of its ...
-
Google bans employees from using Zoom on their devices
Another day and another organization has banned Zoom over privacy concerns around the popular video conferencing app. This ...
-
Why the coronavirus lockdown makes you more vulnerable to phishing scams
As the world scrambles to deal with the coronavirus (COVID-19) pandemic, social distancing is the best solution we currently ...
-
Coronavirus pandemic has unleashed a wave of cyber attacks — here's how to protect yourself
While most of the world is trying to deal with the COVID-19 pandemic, it seems hackers are not on lockdown. Cyber criminals ...
-
Zoom is a godforsaken mess — but it can be fixed
Two years ago, after Facebook's Cambridge Analytica scandal came to the fore, there was a new story of the social network's ...
-
After a litany of security fuck-ups, Zoom promises weekly updates
While the world is sitting at home, video calling and conferencing apps are having the time of their lives. Zoom is probably ...
-
Coronavirus hype leads New York's top lawyer to probe Zoom over security
Zoom so far says its school services are in line with federal laws, but let's see if that tune changes with New York's top ...
-
How to make your security training fun? Think like a deviant
CircleCI hired two DefCon hackers to teach their devs to think like deviants, much more effective than a boring PowerPoint ...
-
Pardon the Intrusion #13: Policing using AI
Indian law enforcement agencies have employed facial recognition tech to identify more than 1,100 individuals who were allegedly ...
-
Pardon the Intrusion #12: Private by default
Mozilla, the company behind the Firefox browser, has begun rolling out encrypted DNS over HTTPS (DoH) for US users by default. ...
-
Coronavirus domains 50% more likely to infect your system with malware
There have been over 4,000 coronavirus-themed domains registered since January — and their malicious rate is alarmingly ...
-
Mobile voting is far from perfect, but it's better than what we have now
The United States need to everything in their power to increase voter turnout, and that means embracing new technologies ...
-
Language analysis reveals how new offenders get involved in dark web pedophile communities
The “dark web” – a collection of heavily encrypted websites, forums and social networks – notoriously provides spaces ...
-
How to protect your personal data in the age of IoT
The Internet of Things (IoT) device universe is expanding. This statement echoes for the fifth year in a row—only the ...
-
That unexpected 'HIV test result' email you just got is probably a scam
If you got an unexpected email about an HIV test result, don't panic: hackers might be trying to steal your personal data ...
-
Stop saying employees are the weakest link in cybersecurity
If you and your company are serious about cybersecurity, then you need to drop the counter-productive 'weakest link' mantra ...
-
Focus on the client-side to protect your company from Magecart attacks
The three steps required to shield your company from a Magecart attack.
-
Pardon the Intrusion #11: No more passwords
Google has open-sourced its security key technology, allowing anyone to build their own hardware security key for the strongest ...
-
CIA agents have been hacking China for 11 years, security firm claims
A leading Chinese security firm has accused the CIA of hacking local businesses and government agencies for the past 11 years. ...
-
Shocker: There’s another smart camera hackers can use to spy on you
Researchers have found gaping security holes in yet another smart camera, with the vulnerabilities practically turning the ...
-
Let’s Encrypt has now issued a billion free HTTPS certificates
HTTPS is now considered to be a base standard for website security. You can always check if a website is using the latest ...
-
How to see where you're logged in on Facebook, Twitter, and Instagram
You should always know what devices have access to your social media platforms. Here's how you can check -- and log out if ...
-
Hackers earned nearly $40M in bug bounties in 2019
Ethical hacking is swiftly turning into a lucrative spare time activity — for a small chunk of white-hat hackers at least. ...
-
Some Teslas have been tricked into speeding by tape stuck on road signs
McAfee researchers have tricked Tesla cars into autonomously speeding just by sticking two inches tape on a speed limit ...
-
Why laptops could be facing the end of the line
Microsoft’s recent announcement that it would end support for users of its Windows 7 operating system had stress written ...
-
Pardon the Intrusion #10: Faces faces everywhere
The latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter, in which we explore the wild world of security. ...
-
Don't be fooled: Blockchains are not miracle security solutions
Blockchains are neither security holes nor miracle security solutions. They must be considered within their ecosystem and ...
-
UN suffered a serious hack — and then tried to cover it up
The United Nations suffered a critical breach in its networks last year, and subsequently tried to cover it up. The hackers ...
-
The 3 trends that define the future of cybersecurity jobs
With each passing year, our adoption of advanced technology becomes more pronounced. Different aspects of our lives are enhanced ...
-
The FBI is cracking iPhone 11s without Apple's help, so why does it need a backdoor?
The FBI has found ways to crack Apple's current-generation iPhones without help from the company, but it still wants to break ...
-
Google found vulnerabilities in Apple’s Safari that allowed user tracking
In December, Apple fixed multiple bugs found in its Safari browser that allowed third-party websites to track users' browsing ...
-
Conway’s Law and DevSecOps: How communication affects security
For DevSecOps, the challenge is to keep communications effective and secure. Machine data will be essential in making this ...
-
Report: Apple drops plan to encrypt iCloud backups after FBI protests
Apple has built a reputation for being privacy-forward. Its devices are more locked down than those of competitors, and ...
-
Pardon the Intrusion #9: Privacy or security?
The latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter, in which we explore the wild world of security. ...
-
Pardon the Intrusion #8: Location trackers
The latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter, in which we explore the wild world of security. ...
-
Pardon the Intrusion #5: In AI we trust
The latest edition of Pardon The Intrusion, TNW’s bi-weekly newsletter, in which we explore the wild world of security. ...
-
How to implement a ‘threat model’ to beef up your organization’s security
A threat model is the most effective way to take stock of your company’s security and make sure it’s continuously up-to-date. ...
-
Ring admits employees inappropriately accessed customer videos
Amazon's $1 billon purchase, Ring, has admitted some of its employees abused their roles to improperly access users' video ...
-
Smart locks are cool as fuck — but I'll never trust them
I honestly think smart locks are super cool, but I just don't think I could ever have one on the front door to my house or ...
-
Facebook’s a mess, but it doesn’t mean backdoors are the answer
Despite my run-ins with the Islamic State, I believe backdoors aren't the answer. What we need is a pre-agreed, cryptographically ...
-
Fixing employee access should be your top security priority in 2020
Where previously, many have perceived hackers as technical threats, today many in the industry are instead looking at human ...
-
3 security steps you should take to protect your company from fraud
Security needs to be baked in from the beginning – not bolted on at the end. Here are the key security questions businesses ...
-
267 million Facebook users' data has reportedly been leaked
A database containing more than 267 million Facebook users' data was reportedly found exposed online, says Comparitech and ...
-
Ring home surveillance cameras are far less secure than Gmail and Facebook
Ring's offerings lack basic features to help protect customers from being snooped on by people who gained unauthorized access ...
-
The pros and cons of how Google Chrome encrypts DNS activity
Thanks to the expansion of HTTPS, the secure version of the original HTTP protocol, most internet traffic is encrypted today, ...
-
Amazon Ring owners foil $400K Bitcoin extortion plot by removing batteries
Hackers will do anything to get their hands on Bitcoin. Extortionists managed to breach Ring cameras to demand cryptocurrency ...
-
[Best of 2019] What the hell is a 'cyber diplomat'?
TNW spoke with Estonia’s first Ambassador at Large for Cybersecurity, Heli Tiirmaa-Klaar, about the new emerging field ...
-
[Best of 2019] No, end-to-end encryption isn't a marketing gimmick
Sound the bad take claxon.
-
This $722M Bitcoin mining scam referred to its marks as 'dumb' investors and 'sheep'
Authorities in the US have arrested three men in connection with a Bitcoin mining scheme that allegedly defrauded investors ...
-
How we can stop our smart toasters from spying on us
Statista projects that there will be 75.4 billion Internet of Things (IoT) connected devices by 2025, a fivefold increase ...
-
Dev says MakerDAO attackers could turn $20M in Ethereum into $340M almost instantly
A software developer claims to have found a way in which to make an "incredibly profitable" but "expensive" attack to steal ...
-
Judge orders Telegram founder Pavel Durov to testify over its crypto ICO
Telegram’s founder and CEO Pavel Durov should testify in the US Securities Exchange Commission's (SEC) case against the ...
-
Stantinko botnet caught using YouTube to mine Monero cryptocurrency
The Stantinko botnet has now added cryptocurrency mining to its toolset — and it's been using YouTube to evade detection. ...
-
How DevOps and security teams can get along better
For IT security teams, the rise of DevOps has led to problems with managing security and risk too — but there's a way to ...
-
Mozilla’s report shows just how awful Ring’s privacy practices are
When the first internet-connected devices hit the market, they were rare enough that you could seriously consider whether ...
-
Bugs in Qualcomm chips leaked private data from Samsung and LG phones
Researchers have disclosed a set of vulnerabilites affecting Qualcomm chipsets that could allow a potential attacker to steal ...
-
Disney+ accounts are being stolen and sold online
Scarcely a week after the service debuted, Disney+ accounts area already being hacked en masse. Users report their accounts ...
-
146 security flaws uncovered in pre-installed Android apps
Researchers at Kryptowire have uncovered 146 security vulnerabilities in preinstalled apps across 29 Android handset manufacturers. ...
-
Moonday Mornings: Russia’s security agency reportedly linked to $450M cryptocurrency loss
Welcome to another week of cryptocurrency and blockchain news. Before we get on with the week, let’s take a look at what ...
-
Safari gets support for hardware security keys with iOS 13.3
Apple's iOS 13.3 update comes with a new nifty feature that allows Safari users to use hardware security keys for two-factor ...
-
Google confirms plans for a search tool that can analyze millions of health records
Google partners with Ascension to give it access to personal health datasets that can be used to develop AI-based tools for ...
-
Sketchy Android keyboard app with 40M downloads makes money off unauthorized purchases
Android third-party keyboard app Ai.type has been found to stealthily sign up users for millions of unauthorized purchases ...
-
Facebook Groups members' info left exposed to 100 app developers
Facebook has revealed that an unspecified number of third-party apps from as many as 100 developers may have improperly accessed ...
-
Uber used Bitcoin to pay $100K hacker ransom in 2017, court docs confirm
Uber used Bitcoin to pay hackers who held sensitive data for ransom, court documents have confirmed.
-
Belgian watchdog's list of scammy cryptocurrency ventures grows to 131 sites
The Belgian Financial Services and Markets Authority is still having to warn netizens about cryptocurrency scams. Its list ...
-
Pardon the Intrusion #3: it's 2FA or bust
Welcome to the latest edition of TNW's Pardon The Intrusion, a newsletter where we explore the wild world of cybersecurity. ...
-
WhatsApp sues Israeli security firm for injecting malware into targets' phones through its app
WhatsApp just sued Israel-based security company, the NSO Group, in a US federal court for allegedly injecting malware into ...
-
4 practical tips to verify if your customers are who they say they are
In the future, a digital ID may replace all your current forms of identification. At the same time, as we become more and ...
-
Oops — Adobe leaves 7.5 million Creative Cloud accounts exposed
Adobe has become the latest victim of a serious serious security breach that exposed information of nearly 7.5 million users ...
-
Hackers are using a bug in PHP7 to remotely hijack web servers
Things are going to get worse before they get better.
-
VPN apps with 500M+ installs caught serving disruptive ads to Android users
Four Android apps with cumulative installs of more than 500 million have been found to serve disruptive ads outside the apps. ...
-
Modern cybersecurity is inaccessible to smaller companies — and that’s bad for you
We find ourselves in an era when it’s not a question of if but when you’ll get hacked. So it's time to stop and declare: ...
-
Hackers give Johannesburg government 3 days to pay over $30K in Bitcoin
A group of cybercriminals calling themselves the “Shadow Kill Hackers” has reportedly attacked the City of Johannesburg ...
-
Your smart watch will soon log you into your accounts without a password
Authentication solutions provider Nok Nok Labs has officially announced the availability of FIDO-based passwordless authentication ...
-
Conservatives put national security at risk to storm impeachment proceedings
Impeachment proceedings against US President Donald Trump were delayed today when a group of Conservative lawmakers stormed ...
-
Chrome and Firefox will now alert you about data breaches involving your accounts
Mozilla and Google add password breach notification tools natively into Firefox and Chrome browsers respectively in the latest ...
-
It doesn’t matter ‘who’ hacked your business
For business leaders, attribution can be an unnecessary distraction – the focus needs to be on protecting against an attack ...
-
Google's Titan key for locking your online accounts is now available with USB-C
Google has announced a USB-C Titan Security Key, manufactured by Yubico, that's compatible with Android, Chrome OS, macOS, ...
-
Vatican launches smart rosary, someone already found a security flaw
Last week, the Vatican announced it was getting into the Internet of Things with an "eRosary." Naturally, it didn't take ...
-
The US nukes will no longer run on plate-sized floppy disks
Enjoy your retirement, old school floppy disks! The US military is upgrading its nuclear system so it'll no longer use the ...
-
Moonday Mornings: Another cryptocurrency SIM-swap victim sues AT&T, this time for $1.8M
Welcome to Moonday Morning forkers. It's Hard Fork's wrap-up of the weekend's top cryptocurrency and blockchain headlines ...
-
Telegram is postponing its token sale, and it’s still not happy with the SEC
Telegram has yielded to the US Securities and Exchange Commission over the sale of its Gram tokens, for now. But it still ...
-
Pixel 4's 'Face Unlock' works even if you're asleep or dead -- and that's a problem
Google’s new Pixel 4 smartphone doesn’t have a fingerprint sensor. Instead it relies on “Face Unlock,” a proprietary ...
-
Cryptojacking worm uses Docker to infect over 2,000 systems to secretly mine Monero
Unit 42 researchers have uncovered the first-ever instance of a new cryptojacking worm called Graboid that propagates via ...
-
Microsoft rolls out Tamper Protection for Windows antivirus to keep hackers at bay
Microsoft has officially announced the general availability of Tamper Protection feature for its Windows Defender Antivirus ...
-
Google's Titan Security Keys can be hijacked remotely, replace yours now
Google is recalling Bluetooth versions of its Titan Security Key after it found a vulnerability that allows attackers in ...
-
North Korea-linked hackers revive cryptocurrency scam to hijack macOS
Security researchers uncovered another attack from Lazarus hacking group which seems to be nothing more than a rehash of ...
-
Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data
Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The ...
-
Cybersecurity vendor that protects firms from data breaches hit by data breach (Updated)
Security vendor Imperva blamed its August security breach on an AWS API key a hacker stole from an internal test database ...
-
France says hackers might go after supply chains after Airbus cyber assault
France has issued a new cyber threat advisory about targeted espionage operations directed at service providers and engineering ...
-
A bug in Indian local search app exposed over 156 million accounts
A major flaw in an Indian local search app, Justdial, allowed hackers to log in to any of its 156 million users accounts. Apart ...
-
Here’s how you make your Google Docs secure
Google Docs is one of the few online applications that I’m deeply dependent on for my everyday work. Like millions of other ...
-
Instagram's new feature can help spot phishing scams — here's how
Instagram is rolling out a new security feature that makes it easy to spot phishing mails that make it seem like they come ...
-
Twitter says it used your 2FA info to advertise by accident
Twitter today revealed it may have misappropriated its users private info by giving it to advertisers. The information in ...
-
Hacking victim who paid Bitcoin ransom goes on to hack the hackers
The hackers behind the Muhstik ransomware virus have been rekt by a German programmer who simply had enough after paying ...
-
China's new 500-megapixel 'super camera' can instantly recognize you in a crowd
Chinese researchers develop a new 500 megapixel facial recognition camera capable of capturing "thousands of faces at a stadium ...
-
Apple reportedly pulls app that warns Hong Kong citizens about police activity (Updated)
Apple has approved an app that allows people in Hong Kong to keep track of protests and police activity in the city state ...
-
US and UK pressure Facebook for backdoor access to WhatsApp messages
The US, the UK, Australia are calling on Facebook to delay its plans to implement the end-to-end encryption across its messaging ...
-
DoorDash leaves door open for data breach, affecting 4.9M people
Popular on-demand food delivery platform DoorDash has confirmed a data breach affecting 4.9 million customers, workers, and ...
-
Exchanges form Crypto Rating Council, but pre-emptively admit its ratings mean nothing
It's likely this whole Crypto Rating endeavour is pure virtue signalling to appease regulators, and a confusing waste of ...
-
Zero-day exploits: 14 things to remember when an issue is discovered
Zero-day exploits can be detrimental to businesses. However, depending on how you handle an incident when it occurs, you ...
-
Zcash network urged to update nodes immediately to push 'important security fix'
If you're running a Zcash node, you had better go download the latest software and update right now to avoid exposing the ...
-
Here’s how to fight back against Bitcoin-ransoming malware
It sucks when hackers hit you with ransomware and demand Bitcoin for your data's return. Don’t worry, there are things ...
-
Kik fires staff and shuts down messaging app but won’t stop fighting the SEC over its ICO
Kik's CEO said in a blog post this morning that the ongoing fight with the SEC has left the company with no other decision ...
-
Meet Panda, an illicit cryptocurrency mining crew terrorizing organizations worldwide
Panda isn't very sophisticated, but it is absolutely prolific: researchers say the crew could've earned roughly $90,000 in ...
-
Over 13.7M US medical test records found unsecured on servers
Medical records belonging to millions of patients across the world, including echocardiograms and X-rays, are stored on insecure ...
-
Colossal Ecuador leak exposes data of 20M individuals — including Julian Assange
The personal data of just about every citizen of Ecuador has been found exposed online in what could be the country's biggest ...
-
Apple claps back at Google for spreading FUD in iOS exploit report
It was just last week that we covered a report by Google's Project Zero security researchers claiming they'd identified a ...
-
How Android 10 is making your phone more private and secure
A comprehensive look at all the new privacy and security features of Android's latest version Android 10; rolling out to ...
-
French travel site Option Way leaks 100GB worth of customer details
A report published today by security research firm VPNMentor suggests its team found 100GB of unsecured customer data from ...
-
These hackers are supercharging your sex toys for increased pleasure
This article was originally published on SEXTECHGUIDE, an independent publication that looks at the intersection between ...
-
23 state agencies across Texas succumb to a 'coordinated ransomware attack' (Updated)
Texas is fighting a coordinated ransomware attack that has impacted at least twenty local government entities across the ...
-
Ring's surveillance partnership with law enforcement is deeper than previously thought
Ring has disclosed that it has inked deals with 405 agencies to "facilitate conversations around crime and safety among all ...
-
Android phone brands ranked by OS update frequency: Nokia is #1
One of the major concerns when you buy an Android device is the frequency of updates you’ll receive over the years.. Google ...
-
Want to make $10,000 from Libra? Break its blockchain
The supposedly independent group of companies tasked with overseeing the delivery of Facebook's "cryptocurrency" Libra has ...
-
Cryptography startup sues Black Hat conference after getting booed and heckled
A cryptography startup is taking things up a notch and is suing organizers of security conference Black Hat USA after being ...
-
Hostinger's database of 14 million customers' info hacked
Hostinger has forcibly reset all of its client passwords following an unauthorized access of its customer database of about ...
-
Stolen fingerprints could spell the end of biometric security – here’s how to save it
The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database ...
-
Pure cringe: UK ISP has the worst excuse for storing passwords in plaintext ever
Virgin Media: Plaintext passwords are okay because it's illegal to do crimes, apparently.
-
Vitalik Buterin: Using Ethereum is expensive, and its blockchain is 'almost full'
Ethereum co-founder Vitalik Buterin has reiterated warnings that his blockchain has significant scalability problems, and ...
-
AI won't automate cybersecurity — but it'll improve the solutions we already have
Cybersecurity, a huge industry worth over $100 billion, is regularly subject to buzzwords. Cybersecurity companies often ...
-
Researchers discover malware that records users' screens when they watch porn
Researchers from antivirus developer ESET recently discovered a new form of spam-delivered malware that threatens to steal ...
-
Cryptocurrency scammers conned Australians out of $14.8M in just 7 months
Cryptocurrency investment scams in Australia cost victims a record $14.76 million between January and July this year.
-
Map reveals which cities use Ring's surveillance network to spy on you
An engineering student in Illinois has put together a handy map to help pinpoint locations where police are tapped into Ring’s ...
-
Researchers: Popular gay dating apps are still leaking users' location data
A handful of the most popular gay dating apps are exposing the precise location of their users. In a demonstration for BBC, ...
-
Apple announces developer iPhones with root access for security research
For all we've made fun of Apple's walled garden here, every once in a while, the company opens up just a bit. Case in point: ...
-
Here's how gamification can help your business understand your users
Today’s operations require more comprehensive stores of information, most of which deals expressly in the human behavior ...
-
Kazakhstan begins intercepting citizens' web traffic to 'protect them from cyber threats' (Update: It's canceled)
The Kazakhstan government has started to intercept all HTTPS traffic from all devices within its borders effective July 17, ...
-
Microsoft: Russian government hackers are targeting IoT devices
Microsoft today warned that Russian government hackers have been using video decoders, printers, and internet of things devices ...
-
Google's advanced account protection features are now available to G Suite users
Google has announced several updates to its enterprise cloud platform with an aim to improve users, data, and app security. ...
-
Google researchers disclose ‘interactionless’ iOS exploits valued at $5M
A duo of Google researchers have disclosed several "interactionless" vulnerabilities in iOS that allowed hackers to hijack ...
-
Security firm releases flawed blockchain into the wild to help educate hackers
One security firm thinks it can fix insecure blockchains, and it believes the key is to start with a really insecure one. ...
-
Russians caught peddling spyware disguised as legit Google and Pornhub apps
Researchers say a Russian software firm fined by Obama for meddling in the 2016 US elections is making spyware disguised ...
-
Android vulnerability lets hackers hijack your phone with malicious videos
A vulnerability in Android ( found in versions between 7.0 and 9.0) enables hackers to hijack your phone by tricking you ...
-
Cryptocurrency startup YouHodler leaks troves of unencrypted customer data
Cryptocurrency startup YouHodler has reportedly exposed troves of sensitive customer data including credit card information ...
-
Slack now loads 33% faster – and eats up 50% less of your RAM
No, you're not imaging things: the latest iteration of Slack for desktop is significantly snappier. Not only that, it also ...
-
Researchers find worrying security vulnerability in GE Healthcare anesthesia machines
Our health – and yes, our lives – are in the hands of researchers and vendors.
-
Monero security flaw could've seen XMR stolen from cryptocurrency exchanges
Monero devs have disclosed nine security vulnerabilities over the past two days - and some could have been outright devastating. ...
-
Dutch ministers push for cryptocurrency regulation to fight money laundering
Dutch ministers want to regulate cryptocurrencies as part of a wider effort to tackle money laundering in the country.
-
Moonday Mornings: Facebook scammers target UAE investors with fake Bitcoin ads
Welcome to another week and another Moonday Mornings. It's Hard Fork's wrap-up of the weekend's top Bitcoin, cryptocurrency ...
-
Two-thirds of failed stablecoin projects were backed by gold
Most of the stablecoin projects announced since 2017 are still yet to launch, and two-thirds of stablecoin projects that ...
-
US prisons are taking programming books off the shelves over 'security concerns'
The Oregon Department of Corrections (DoC) has banned prisoners from reading dozens of books related to technology and programming, ...
-
Hackers are turning our AI security systems against us — but they can be stopped
With the use of AI growing in almost all areas of business and industry, we have a new problem to worry about – the “hijacking” ...
-
Why Samsung's virus scans for smart TVs are a UX disaster
Samsung wants you to run a virus scan on your smart TV every few weeks. Here's why that's a terrible idea, and why you shouldn't ...
-
India is still hounding WhatsApp to make its messages traceable
Indian aks WhatApp to "digitally fingerprint" every message sent on its platform without breaking encryption, according to ...
-
Russians (not North Koreans) thought to be behind $530M Coincheck hack
The $530 million hack that blighted Japanese cryptocurrency exchange Coincheck in January 2018 may have been carried out ...
-
This Google sister company showed you can buy a troll campaign for $250
A new report from Wired reveals that Google's sister company Jigsaw bought a Russian troll campaign as an experiment for ...
-
Addressing the privacy paradox: Top leaders and experts share insights
During TNW Conference 2019, top government officials, business and technology leaders came together at The Assembly to discuss ...
-
WATCH: Bitcoin ATM showers London's Bond Street station in cash money
Footage has surfaced of a Bitcoin ATM filling a duffel bag with bank notes, as a security guard tries to keep onlookers at ...
-
Microsoft stops asking you to change your Windows 10 password every 60 days
Microsoft has finally removed its 60-day password expiration policy from its Windows 10 security baseline. So no need to ...
-
Someone spent $1.3 million on a malware-ridden laptop and I clearly don’t understand art
If you’d bought a Samsung NC10 the day it was released, the laptop would have set you back about $499. That was 11 years ...
-
Kik raised $98M with a potentially illegal ICO. Now it wants your money to fight the SEC
Kik has resorted to begging the public for money to keep fighting the SEC over claims it illegally sold unregistered securities. ...
-
Minimize potential cyber hack damage with these 11 good data habits
Cybercriminals and hackers are more aggressive than ever these days. With advanced technology, breaches are increasingly ...
-
This tiny flashing kit can break your bad online security habits
The number of cyber attacks is estimated to have risen by 67% over the last five years, with the majority of these data breaches ...
-
Google stored some G Suite passwords in unhashed form for 14 years
Google says it discovered a bug that caused some of its enterprise G Suite customers to have their passwords stored in an ...
-
Kenya is allegedly selling citizen data to highest corporate bidder
According to Dr. Roselyn K. Akombe, Chief of Policy Planning and Guidance at the United Nations and ex-commissioner of Kenya's ...
-
How an engineer at a crypto-security startup lost $100K in a SIM-swapping hack
BitGo engineering lead Sean Coonce suffered a debilitating $100,000 loss in a SIM-swapping attack on his Coinbase account. ...
-
Hackers made $32K in 7 weeks by fixing bugs in cryptocurrency projects
Blockchain projects TRON, Brave, and EOS have rewarded white hat hackers with cash for fixing their security flaws, according ...
-
This is the email Tesla sent employees after a series of recent leaks
Tesla this week sent an email to employees warning about the impact of on-going press leaks. The email reminded employees ...
-
Here's why Binance can't erase the $40M hack from Bitcoin's blockchain
Binance CEO Changpeng Zhao briefly mulled 're-organizing' Bitcoin to exact revenge on the hackers that stole 7,000 BTC from ...
-
Cyber insurance is worth the hype — if you let hackers write your policy
I read Rami Sass’ recent piece here on Podium about how cyber insurance is overhyped. While he raised great questions about ...
-
Binance hacked for over $40M worth of Bitcoin
Binance suffered a "large scale security breach" yesterday evening. The hackers were able to transfer 7,000 Bitcoin (over ...
-
TRON suffered from a critical bug that could’ve crashed its entire blockchain
A recent HackerOne disclosure reveals the TRON network had a pretty nasty security flaw, and a security researcher was paid ...
-
Bitcoin has nearly 100,000 nodes, but over 50% run vulnerable code
The number of nodes on the Bitcoin network hovers around 100,000 - which is great for decentralization - but many remain ...
-
Amazon wants to deliver crime news and fear to Ring doorbell owners
Amazon is in the process of a curious hire - a Managing Editor, News - to help bring "breaking crime news alerts" to owners ...
-
Our smartphone addiction isn’t just bad for our mental health, it’s a security risk
We’ve all had the “smartphone conversation.” The one about our unhealthy obsession and inability to put phones down. ...
-
Why shadow IT is the next looming cybersecurity threat
Shadow IT is an issue that just about every organization faces on some level, but when I speak to executives and IT leaders, ...
-
Ethereum bandit makes off with $6.1M after bypassing weak private keys
There’s a blockchain bandit on the loose – and they’ve already thieved over $6.1 million worth of Ethereum.
-
Healthcare has a massive cybersecurity problem, and we're not doing enough to fix it.
Not long ago, it was reasonable to think that financial businesses would be the most prominent and most profitable targets ...
-
4 things that concern Vitalik Buterin about moving Ethereum to Proof-of-Stake
Ethereum co-founder Vitalik Buterin took to Reddit to discuss some of the biggest roadblocks ahead the network’s transition ...
-
CHEAP: Protect your family with Ring’s 15-piece home security kit for just $300
This deal comes with a free Amazon Echo Dot!
-
Hackers tweet Bitcoin nonsense and racism via Sweden's top political party
The Twitter account of Sweden's governing party was hacked with cryptocurrency-related nonsense and wildly offensive hate ...
-
6 things you should do to protect yourself from hackers (but probably won’t)
Hackers are glorified on television for the sake of entertainment value, making a spectacle out of coding activity and what ...
-
Smart cities are an AI-powered dystopia that's already happening
Separating the futuristic from the dystopian in the minds of the general public can be a challenge, particularly when trying ...
-
Rebuilding trust in democracy starts with digital identity verification
As Mark Zuckerberg recently wrote, “free and fair elections are the heart of every democracy.” Despite controversy over ...
-
Cyber insurance for companies is overhyped — even though it may be necessary
For those following the information security space, it can feel as if the past year was just a series of announcements with ...
-
Here's how personalized ransomware attacks work, and how to protect yourself
Once a piece of ransomware has got hold of your valuable information, there is very little you can do to get it back other ...
-
Hackers fix 20 security flaws in cryptocurrency-related platforms in 2 weeks
Seven cryptocurrency-related companies paid hackers to patch 20 software bugs in the past two weeks alone, including Stellar, ...
-
Wyze's new motion and contact sensor kit secures your home for just $20
We came away impressed when we reviewed Wyze's Cam Pan security camera last year. At just $30 a camera, it was almost disconcertingly ...
-
Weiss Ratings: EOS is the best cryptocurrency, then Ripple, and THEN Bitcoin
Weiss Ratings' latest report placed alternative cryptocurrencies EOS and Ripple alongside Bitcoin as the top three, snubbing ...
-
13 ways entrepreneurs can help their company guard against hacking
As technology evolves, so do hackers' techniques, something which puts tremendous pressure on organizations to constantly ...
-
Moonday Morning: Bitcoin dev ordered to prove Craig Wright isn’t Satoshi
It's Monday which means it's Moonday Morning and time to catch up with the top cryptocurrency and blockchain news from over ...
-
Security researchers found over 40 bugs in blockchain platforms in 30 days
The security experts found kinks in Monero, EOS, and popular cryptocurrency exchange desk Coinbase. Fortunately, none of ...
-
Ethereum insiders deny there’s only one computer keeping a copy of its blockchain
After Ethereum's most recent fork, the cryptocurrency community learned of its special "big, scary nodes," and immediately ...
-
Moonday Mornings: 30% of cryptocurreny startups failed in 2018
Another weekend has come and gone, meaning there's blockchain and cryptocurrency news to catch up on, thankfully Monday Mornings ...
-
We’re not safe without information privacy
It’s not just because you are a criminal and the coppers might catch you. Or because you really, really hate big corporations ...
-
Web apps will soon let you log in with hardware keys and fingerprints
WebAuthn a standard for authenticating your identity on the internet, has now been ushered in as an official standard by ...
-
Push notifications are the future of multi-factor authentication
It's hard to believe, but the most popular password in 2018 was – get ready for it - “123456,” the winner and still ...
-
Facial recognition tech sucks, but it’s inevitable
Is facial recognition accurate? Can it be hacked? These are just some of the questions being raised by lawmakers, civil libertarians, ...
-
The worrying trend of children’s data being sold on the dark web
When was the last time you got a data breach notification, a letter in the mail about a potential compromise, or an email ...
-
How this Australian bank tracked 17,000 kilos of almonds with the blockchain
Last year the Commonwealth Bank of Australia put a shipment of 17,000 kilos of almonds on the blockchain. But how exactly ...
-
How to use two-factor authentication on popular PC gaming platforms
Welcome to TNW Basics, a collection of tips, tricks, guides, and advice on how to get the most out of your gadgets, apps, ...
-
15 strategies everyone should know to protect their online information
As technology increases at an ever-faster rate, so too do the ways in which our information can be put at risk. With the ...
-
Coinbase handed out a $30K bounty for a critical bug in its systems
Another day, another bug: cryptocurrency exchange desk Coinbase has handed out a massive $30,000 bug bounty for a critical ...
-
The ultimate cryptocurrency explainer: Bitcoin, utility tokens, and stablecoins
Ten years ago, the arrival of Bitcoin changed how we view the global monetary system: it ushered a new era that is reshaping ...
-
Important security lessons learned from Apple's creepy FaceTime bug
Earlier this month, I woke up to a disastrous security bug in Apple’s FaceTime that could let anyone easily eavesdrop on ...
-
Where automotive cybersecurity is headed in 2019
There are more connected cars than ever -- manufacturers are making more of them than ever, more people are driving them ...
-
Google’s new extension tells you if your passwords have been compromised
Google's just launched a Chrome browser extension that's designed to help protect your online accounts from intruders. Hopefully, ...
-
WhatsApp can now protect your chats with TouchID and FaceID (and I hope it gets copied)
WhatsApp is launching a new security feature that's so simple and useful, I'm surprised more messaging apps haven't implemented ...
-
Politicians have failed us, it's time for AI to stop school shootings
Thoughts, prayers, and politicians have proven ineffective against the threat of school shootings. It's time to demand schools ...
-
Ethereum blockchain undergoes massive cryptocurrency gambling exodus
The Ethereum blockchain was once home to the bulk of the internet's cryptocurrency gamblers, but not anymore. It seems they've ...
-
Japanese officials will target millions of IoT devices to help secure the Olympics
Hack (a bit of) the planet!
-
Everybody hates cybersecurity professionals
Infosec has an image problem.
-
Protecting yourself from inevitable data breaches is easier than you think
It’s tempting to give up on data security altogether, with all the billions of pieces of personal data – Social Security ...
-
The quiet threat inside 'internet of things' devices
As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new ...
-
How 2018 became Facebook’s worst year in privacy and security
In early December, Facebook’s developer team declared the discovery of a security bug that gave developers access to ...
-
Cryptocurrency mining malware has become self-aware (kinda)
Cryptocurrency mining malware has evolved and is now able to switch off security services to continue mining without being ...
-
773 million email addresses have been leaked – check if yours is on the list
We’re just over two weeks into 2019, and one of the biggest data leaks in recent years has surfaced. Today, renowned security ...
-
Long-serving cryptocurrency exchange forced offline, hackers blamed
One of the internet’s longest serving cryptocurrency exchanges, Cryptopia, claims to have suffered a debilitating hack, ...
-
Keep your digital life secure with these 6 simple tricks
Data breaches, widespread malware attacks, and microtargeted personalized advertising were lowlights of digital life in 2018. As ...
-
NASA looks to secure flight data with blockchain tech
NASA is exploring potential use-cases for blockchain technology in a bid to safeguard the privacy and security of aircraft ...
-
Google twists Samourai Wallet's arm to disable privacy features
Samourai Wallet, a bitcoin wallet provider, is temporarily disabling some of its privacy-related features following a request ...
-
There's more to Bitcoin maximalism than meets the eye
What exactly is Bitcoin maximalism? In this article, Hard Fork takes a look at what Bitcoin maximalism is, and what it means ...
-
This is the future of authentication, according to security experts
Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced ...
-
Teacher of the year for life: Professor hired mercenaries to rescue student from ISIS
Some teachers deserve apples, this one deserves a whole orchard after sending a team of mercenaries to rescue a student who ...
-
Let’s face it, users should never be the last line of defense in cybersecurity
Users have walked a very insecure tightrope for decades, clicking on links and opening untrusted attachments. It's time we ...
-
This sex-positive dating app connects people through their fantasies
As with, well, everything really, the internet has changed the dating game. Just think how ubiquitous the phrase “swipe ...
-
Starwood breach affecting 500M users reportedly part of a larger Chinese state-sponsored attack
The New York Times reports that the Starwood breach was part of a larger state-sponsored intelligence-gathering effort spurred ...
-
12 big encryption trends that will keep data more secure
As cybercriminals become more sophisticated, it becomes easier for them to circumvent security measures and access sensitive ...
-
5 ways AI can be an ally for human rights over the next decade
Happy Universal Human Rights Day! We came up with five ways we think AI will help us in the fight for all of humanity over ...
-
Moonday Morning: Israel is cracking down on cryptocurrency tax evaders
It's been another weekend of hodling and watching the markets, here's a wrap-up of the weekend's top cyptocurrency and blockchain ...
-
Switzerland says its national blockchain will be more secure than Bitcoin – it won’t be
Swiss Post and Swisscom are building a completely private Swiss blockchain for launching locally operated "decentralized" ...
-
Nasdaq could launch Bitcoin futures in early 2019
Despite the cryptocurrency market's plummeting price of recent weeks, the Nasdaq is still plowing ahead with preparations ...
-
This AI-powered scanner will sniff out your drugs in the mail
The AI can already detect weapons and explosives, and will soon learn to identify synthetic drugs.
-
The frustratingly simple techniques of ‘human hacking’ — and how to fight them
Technology has changed the meaning of how we interpret security and privacy in this digital millennium with tools that can ...
-
Facebook hack proves we need new user authentication methods
Facebook's recent security hack that possibly affected 90 million users has exposed the fundamental flaws that our authentication ...
-
Drone assassination attempts are a reminder that better legislation is needed
It will be up to the private sector, airspace security, and safety companies, to develop solutions that outwit and stop the ...
-
Please appreciate Mozilla’s security-focused gift guide
Shout out Mozilla. The not-for-profit company behind the web-browser Firefox has put together a gift guide with a difference. ...
-
Post-WannaCry: Only 3% of companies are prepared for new types of cyberattacks
One year ago, my phone lit up with the first text alert about the WannaCry ransomware attack. From the onset, it was clear ...
-
China has a new surveillance tool that identifies citizens by how they walk
Chinese authorities have begun deploying a new surveillance tool designed to identify people by how they walk, or the shapes ...
-
Here’s how face recognition tech can be GDPR compliant
Ah, face recognition, that nifty little feature that's already making the still new fingerprint scanners (kind of) obsolete. ...
-
6 reasons why municipalities are getting hammered by cyberattacks
More and more municipalities are becoming victims of hacks. For example in the US, the first half of 2018 has seen many major ...
-
The 7 deadly sins of email security
Email is one of the most fundamental forms of business communication today. Not many of us can imagine our lives without ...
-
Philips will challenge tech giants to bring blockchain to healthcare
Data breaches are among the most damaging security incidents, and they happen everywhere. What makes the healthcare industry ...
-
How to filter marketing fluff from startups’ AI promises
For anyone looking to engage with AI startup companies, the prevalence of marketing fluff can make it difficult to move forward. ...
-
How an employee screw-up made my company better at employee retention
In order to keep a start-up company’s momentum going, you have to be proactive and creative in retaining employees -- since ...
-
Facebook is using your personal data, here’s why it’s fine
When the Cambridge Analytica scandal came out, it did more than just shake up Facebook, it stirred the conversation about ...
-
The algorithms that are currently fueling the deep learning revolution
From beating us at the game of GO, to recreating paintings by Van Gogh, algorithms are all around us. Artificial Intelligence ...
-
Smart cities are for the rich — we need to change that
Chandigarh, the capital of both India’s Punjab and its neighboring state Haryana, is a very special city. It rose from ...
-
Without coaching our privacy, does Google even have a business?
Google is on a seemingly-ceaseless crusade to turn every one of its users into an open book that it can exploit for valuable ...
-
Egypt's new anti-cybercrime law could mean VPN users face jail time
Egypt's President, Abdel-Fattah el-Sissi, has signed into law the Anti-Cyber and Information Technology Crimes legislation. ...
-
Major cryptocurrency exchange delists Bitcoin Gold following $18M hack
A major cryptocurrency exchange is delisting Bitcoin Gold after a series of debilitating heists amounting to over $20 million ...
-
Gaming events will forever have to rethink security after Jacksonville
Esports and event organizers are being forced to rethink and beef up their security after the tragedy in Jacksonville, Florida. ...
-
North Korean hackers are targeting cryptocurrency traders with fake software
Kaspersky Labs has discovered a North Korean hacking crew is targeting cryptocurrency traders by trojanizing exchange software. ...
-
Telling the truth about defects in technology should never, ever, ever be illegal
Congress has never made a law saying, "Corporations should get to decide who gets to publish truthful information about defects ...
-
Tesla whistleblower alleges drug trafficking, illegal surveillance at Nevada Gigafactory
A former Tesla employee today filed a formal complaint with the Securities and Exchange Commission alleging the automaker ...
-
The Australian Securities Exchange is crazy about blockchain – for all the wrong reasons
The Australian Securities Exchange (ASX) annual earnings report featured an impromptu lecture on blockchain tech, claiming ...
-
Twitter is now recommending users follow cryptocurrency scambots
Despite constant pressure to ban them, Twitter has been recommending users follow obvious cryptocurrency scambots impersonating ...
-
An 11-year-old hacked a government website and changed election results at DEFCON
Last Friday, an 11-year-old apparently managed change election results within 10 minutes. While at this year's DEFCON, he ...
-
John McAfee’s 'unhackable' cryptocurrency wallet has been hacked (again)
A team of security researchers has a solid claim to $10,000, after meeting the three requirements of Bitfi's second bug bounty ...
-
Research: More than 56% of all cryptocurrency crime happens in the US
Investigations reveal account information of 720 cryptocurrency exchange users has been stolen, a 369 percent increase from ...
-
Facial recognition is Tokyo’s secret weapon to beat the heat at the 2020 Olympics
The 2020 Tokyo Olympics plans to introduce facial recognition software at security checkpoints -- both to cut down on unauthorized ...
-
Blockchain bug hunters feature prominently at this year's Pwnie Awards
Three researchers are up for Pwnie Awards this year after exposing critical bugs in popular blockchain projects IOTA and ...
-
Bug in cryptocurrency platform Augur meant users could be duped into losing money
A massive vulnerability has been discovered in the decentralized betting platform Augur, which allowed all data shown in ...
-
GDPR is eroding our privacy, not protecting it
It's been more than a couple of months since GDPR (the EU General Data Protection Regulation) came into force. The promise ...
-
Police believe this Alexa skill could prevent break-ins
For centuries, homeowners have relied on increasingly novel ways to deter would-be home invaders: From motion-sensing lights ...
-
Monero wallet vulnerability made it possible to steal XMR from exchanges
Monero, the cryptocurrency often praised for its privacy functions, was full of vulnerabilities - one allowing hackers to ...
-
3 ways regulations need to change for the drone industry to take off
The drone industry is on the cusp of a revolution, with consumer adoption expanding and commercial applications growing, ...
-
John McAfee's 'unhackable' Bitcoin wallet (allegedly) got hacked
John McAfee threw down the gauntlet last week when claiming his newly-created Bitcoin wallet, Bitfi, was "unhackable." It ...
-
Researchers find tons of red flags in Bitfi’s ‘unhackable’ cryptocurrency wallet
An ad-hoc collective of security researchers and hackers has revealed that the Bitfi cryptocurrency wallet is full of spyware ...
-
Binance's first official acquisition is a mobile cryptocurrency wallet
Binance announced it has acquired a mobile wallet solution in an effort to improve “the centralized architecture” of ...
-
Smart contract hacks cost millions — this company wants to fix it
Last November, a user accidentally froze around 514,000 ETH (worth approx. $155 million) in Parity, a popular Ethereum wallet. ...
-
MoviePass never had a chance
Subscription movie service MoviePass offered anyone willing to shell out $10 a month -- less than the price of a single movie ...
-
John McAfee will pay you $100K if you get into his 'unhackable' crypto-wallet
McAfee says he will give $100,000 to anyone who can break into the 'Bitfi' wallet, the supposedly ‘unhackable’ cryptocurrency ...
-
What Hollywood gets right and wrong about hacking
Catherine Flick, De Montfort University Spoiler warnings for Mr. Robot, Arrow, and Blackhat... Technology is everywhere ...
-
Sorry thieves, you can no longer hack iris-scanners using corpse eyes
Researchers in Poland have created a machine learning algorithim that can tell the difference between dead and alive irises. ...
-
Paying for a service doesn’t guarantee it won’t sell your data
In the wake of Facebook’s Cambridge Analytica scandal and congressional hearings, there’s a palpable sense that the pressure ...
-
How cryptography enables online shopping, cloud tech, and the blockchain
What do the Gallic Wars and online shopping have in common? The answer, believe it or not, is cryptography. Cryptography ...
-
AI is finding out when the person using your account isn't you
To some, the future of authentication might look a little creepy. But the explosion of data and connectivity will provide ...
-
Here’s what Sirin Labs’ $1,000 blockchain phone looks like
Remember Sirin Labs – the Israeli manufacturer that built the $16,000 Solarin smartphone nobody wanted? The company is ...
-
Bancor loses $12.5M worth of Ethereum to cyber baddies in overnight raid
Israeli digital asset exchange Bancor has suffered a major hack overnight, a stark reminder that major players are not paying ...
-
White House earmarks over $1B for quantum technology research
Recent bipartisan efforts from the US House of Representatives and Senate have led to the formation of a subcommittee to ...
-
Medicine's blockchainification is imminent, say researchers
Analyzing 40 PubMed journals for blockchains revealed a continued and growing interest from the healthcare research and medical ...
-
Syscoin: Suspicious blockchain activity unrelated to Binance trading anomaly
Syscoin (SYS) cryptocurrency saw a series of odd patterns on its blockchain on Tuesday. After a detailed investigation, the ...
-
How to stop hackers from stealing your information on public Wi-Fi
Why is public Wi-Fi so attractive to hackers? Here we share a simple solution that protects you from the vast majority of ...
-
Google Drive now lets you prevent others from downloading, printing and copying shared files
Google wants to help keep your files a little more secure thanks to new Information Rights Management tools in Drive. Simply ...
-
Load up on CompTIA certification training for less than $8 per course
In the IT world, there’s no more bankable training than certification from CompTIA, one of the industry’s most respected ...