William Hague: Brussels attacks mean we must destroy crypto ASAP
Facts, Willy? Don't let those trip you up, now William Hague, the Conservative former Foreign Secretary, has claimed that the latest Brussels terrorist attacks “show the need to crack terrorist...
View ArticleFree Bitdefender tool prevents Locky, other ransomware infections — for now
Antivirus firm Bitdefender has released a free tool that can prevent computers from being infected with some of the most widespread file-encrypting ransomware programs: Locky, TeslaCrypt, and...
View ArticleRacist troll says he sent white supremacist flyers to public printers at...
Andrew "Weev" Auernheimer in 2012.Auernheimer told the New York Times he was behind a wave of racist print jobs that hit universities across the US.pinguino k Public networked printers at a number of...
View ArticleCRN Exclusive: Fortinet CEO Sounds Off On CMO Exit, Talks Future Marketing...
A Company In Transition Last week, Fortinet partners were rocked by the news that the company's new Chief Marketing Officer, Holly Rollo, had resigned after only about seven months in the role....
View ArticleUS says it would use “court system” again to defeat encryption
Perspecsys PhotosApple's encryption battle Apple likely can’t force FBI to disclose how it got data from seized iPhone Feds break through seized iPhone, stand down in legal battle with Apple FBI...
View ArticleApple-FBI Dispute Ends, But Solution Providers Say Encryption Debate Is Far...
The back and forth between Apple and the FBI over an encrypted iPhone came to an abrupt close Monday when the FBI filed court papers saying it had successfully hacked into the iPhone using a...
View ArticleOracle will seek a staggering $9.3 billion in 2nd trial against Google
Oracle v.Google Google’s copyright win against Oracle is in danger on appeal App developers denounce Oracle’s “shameful” appeal case against Google Microsoft foresees chaos if Oracle v.Google result...
View ArticleInternet users don’t understand security or privacy, says survey
'Shut down the dark net, give governments backdoors', CIGI study finds Canadian think-tank CIGI (the Centre for International Governance and Innovation) reckons ordinary citizens are more comfortable...
View ArticleApple’s fruitless rootless security broken by code that fits in a tweet
Flaws not fully patched in latest versions, says researcher Code dive Apple's rootless security mechanism in OS X can be evaded even in the latest version of the operating system, according to a top...
View ArticleFisherman who has kept USGS buoy for 10 weeks: All I want is compensation
An autonomous monitoring transponder of the type used in the Coordinated Canyon Experiment. All Daniel Sherer has ever wanted was for the government to pay him for a few days of lost work as a...
View ArticleFeds used 1789 law to force Apple, Google to unlock phones 63 times
:DApple's encryption battle US says it would use “court system” again to defeat encryption Apple likely can’t force FBI to disclose how it got data from seized iPhone Feds break through seized iPhone,...
View ArticleNew ransomware installs in boot record, encrypts hard disk [Updated]
Yet another harsh lesson for people who click things they shouldn't.A new type of malware has been described, one that takes crypto-extortion to a new level. While most cryptographic ransomware...
View ArticleU.S. has asked Apple, Google to help unlock devices in more than 70 cases
U.S. government agencies have filed more than 70 orders requiring Apple or Google to help law enforcement agencies unlock mobile devices since 2008, despite the agency insisting its fight with Apple in...
View ArticleCustom-developed Dripion backdoor used for targeted attacks in Asia, U.S.
A new custom-developed backdoor program has been used in highly targeted attacks against organizations from Taiwan, Japan, South Korea, and the United States over the past year. Malware researchers...
View ArticleMicrosoft: Government Requests for User Data Rose in Last Half of 2015
During the second half of 2015, law enforcement agencies made more requests for user information than in the first half.In most cases, they resulted in the disclosure of subscriber information but not...
View ArticleCloudFlare: 94 percent of the Tor traffic we see is “per se malicious”
Ben SalterMore than ever, websites are blocking users of the anonymizing Tor network or degrading the services they receive.Data published today by Web security company CloudFlare suggests why that is....
View ArticleMaryland hospital group hit by ransomware launched from within
Baltimore's Union Memorial is one of the hopitals hit by Samsam, an autonomous ransomware strain spread by exploiting JBoss servers.MedStar Baltimore's Union Memorial Hospital is the epicenter of a...
View ArticleUS Marine Corps launches hacker support unit
Team will conduct OCO, CNE and ISR to stop SNAFUs on MCEN and ODIN The United States Marine Corps has launched a hacking support unit. The Marine Corps Cyberspace Warfare Group (MCCYWG) is already...
View ArticleLastPass Authenticator (for iPhone)
ByMax Eddy The best way to improve your digital security and protect your identity online is to get a password manager.These services store and replay your passwords so you don't have to remember...
View ArticleWeakness in iOS enterprise hooks could let bad apps sneak in
A slide from Check Point's presentation on "SideStepper" showing a malicious server pushing a fraudulent application to an iOS 9 device--all thanks to MDM hacking and Apple enterprise developer...
View Article