Security news

Internet

Your personal data is the currency of the digital age

The commodification of the internet in the early 1990s brought western societies into the digital age and has changed the way consumers interact with commercial enterprises.

Consumer & Gadgets

Amazon announced Ring's new indoor security drone: How will Always Home Cam work?

Consumer drones are notorious for being hard to fly at first, before you learn what you're doing, and the odds are, you will crash it. It's not a question of if, but when.

Consumer & Gadgets

'Alexa, I'm getting pulled over': Amazon dashcam to record traffic stops

Amazon's new security camera for cars unveiled Thursday will allow motorists concerned about a police stop to record the incident by saying, "Alexa, I'm getting pulled over."

Security

Breach at software provider to local governments, schools

A major provider of software services for governments and schools across the United States, Tyler Technologies, told customers Wednesday that an unknown intruder broke into its phone and information technology systems.

Consumer & Gadgets

Data-trackers turn from cookies to phone sensors

Lou Montulli and the late Ruth Wakefield share a common bond. Sort of. Ruth invented the chocolate chip cookie, which has fueled many programmers through long trying hours into the evening testing code and tracking down bugs. ...

Security

German hospital hacked, patient taken to another city dies

German authorities said Thursday that an apparently misdirected ransomware attack caused the failure of IT systems at a major hospital in Duesseldorf, and a woman who needed urgent admission died after she had to be taken ...

Security

New tool helps IT staff see why users click on fraudulent emails

Researchers at the National Institute of Standards and Technology (NIST) have developed a new tool called the Phish Scale that could help organizations better train their employees to avoid a particularly dangerous form of ...

Security

A fingerprint for the Internet of Things

The Internet of Things (IoT) consists of billions of sensors and other devices connected to each other via internet, all of which need to be protected against hackers with malicious purposes. A low-cost and energy efficient ...

Security

Report: Hackers aimed at manufacturing firms during pandemic

In the first six months of the year, as most of the world shut down because of COVID-19 and workers everywhere shifted to working remotely, online criminals and state-backed hackers got busy breaking into computer networks, ...

Security

US announces charges against Chinese, Malaysian hackers

The US Justice Department on Wednesday announced charges against five Chinese nationals and two Malaysians who ran global hacking operations for at least six years to steal identities and video game technology, plant ransomware, ...

Internet

Zerologon: Microsoft addressing severe network exploit

A Dutch security firm reported last week that it uncovered a severe Windows vulnerability last month that allowed hackers to take over network administrator privileges with a single click.

Consumer & Gadgets

Android 11 update offers tweaks and enhancements

They say good things come in small packages. This week's launch of the final release of Android 11 brings no big new attractions but rather several modest-size ones that should please most users.

Security

Swiss official airs concerns about data privacy in US

A Swiss federal commissioner announced Tuesday that a U.S.-Swiss program aimed to protect personal information exchanged between the two countries doesn't go far enough, and has downgraded the United States to rank it as ...

Security

Helping companies prioritize their cybersecurity investments

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those ...

Computer Sciences

Outsmarting the PIN code

A PIN code is usually required at the checkout when paying large sums by credit card. ETH researchers have now discovered a flaw in the security system of some credit cards.

Software

Apple error approves MacOS malware

Oops. Apple, which recently stepped up efforts to guarantee malware is tracked and blocked before it can infect its Macs, has acknowledged the first breach of its notarization process.

Internet

Securing the internet

While many people can name an Internet Service Provider (ISP) and describe what an ISP does, fewer people know the exchange of internet traffic that happens between different ISPs' networks, which are called Autonomous Systems ...

Security

Tesla targeted in failed ransomware extortion scheme

In a tweet, Tesla CEO Elon Musk solved a mystery involving a 27-year-old Russian, an insider at an unnamed corporation and an alleged million-dollar payment offered to help trigger a ransomware extortion attack on the firm.

Security

Red Cross chief: cyber attacks increasing on hospitals

The president of the International Committee of the Red Cross warned Wednesday that the frequency of sophisticated cyber attacks against hospitals, electricity and water supplies, and other critical civilian infrastructure ...