Please turn on your JavaScript for this page to function normally.
Attackers are turning MySQL servers into DDoS bots

Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …

US Library of Congress makes tinkering with your car software legal

The US Digital Millennium Copyright Act (DMCA) makes it illegal to circumvent technological measures used to prevent unauthorized access to copyrighted works. But, there are …

Europe’s new “net neutrality” regulation is full of loopholes

The European Parliament voted yesterday for a Regulation on a Single Market for Electronic Communications. The new regulation brings a complete ban on roaming charges for …

How can we decide on surveillance and privacy when we can’t see the whole picture?

“The surveillance of communications faces a legitimization crisis,” says James Losey, a fellow with the Open Technology Institute, the technology program of the …

Regin spyware found on German Chancellery staff’s personal laptop

The German Federal Prosecutor’s Office has started an investigation regarding the discovery of the infamous Regin backdoor on the private laptop owned by a staff member …

Google earth
Review: Google Earth Forensics

Learn how to use Google Earth geo-location in your digital forensic investigations.

TalkTalk hack: Teenager arrested in Northern Ireland

A 15-year-old boy has been arrested in Northern Ireland in connection with the investigation into alleged data theft from the TalkTalk website.“On Monday, 26 October, at …

SHA-2 encryption will make many sites inaccessible to users who can’t afford newer tech

A group of security researchers has recently announced that it’s highly likely that effective collision attacks that would break SHA-1 encryption will be revealed by the …

TalkTalk breach: Attackers demand £80,000 for stolen data

UK Telecom TalkTalk revealed on Friday that its website has suffered an attack, that it has been taken down as a precaution, and that names, addresses, dates of birth, email …

CCTV botnets proliferate due to unchanged default factory credentials

Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …

Data of 4 million TalkTalk customers likely stolen in wake of website attack

TalkTalk, one of UK’s biggest telecoms, has suffered a “significant and sustained cyberattack” on their website, and it’s possible that personal and …

Microsoft wants researchers to find bugs in .NET Core and ASP.NET, will pay

Microsoft has launched another specialized bug bounty that’s set to run until January 20th, 2016.Bug hunters, who can earn between $500 and $15,000 depending on the …

Don't miss

Cybersecurity news