Please turn on your JavaScript for this page to function normally.
files
EU court: Site operators can log visitors’ IP address for protection against attacks

The Court of Justice of the European Union (CJEU) has ruled that the German government can collect and keep IP addresses of visitors to websites operated by German Federal …

Skype call
Typing while Skyping could leave you vulnerable to eavesdropping

If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at …

mobile payment
Most would stop using digital payments if breached

88% of respondents to a survey conducted by Wakefield Research would stop using digital payments if they personally fell victim to cybercriminal activities as a result of a …

code
Firmware security: An overlooked threat

An increase in connected devices as part of organizations’ hardware footprint, combined with increasingly inventive attack methods from cybercriminals, has brought firmware …

city
Smart cities face unique and escalating cyber threats

Ninety-eight percent of respondents to a survey conducted by Dimensional Research consider smart cities at risk for cyber attacks. Smart cities use IT solutions to manage a …

signal
The realities of WiFi troubleshooting

WiFi continues to be the source of serious problems and confusion in enterprise K-12 and higher education. The most common issues reported were WiFi association and WiFi …

Intel CPU
Researchers bypass ASLR by exploiting flaw in Intel chip

Researchers have found a design flaw in the branch predictor, a component of Intel’s Haswell processor, and have exploited it to bypass ASLR (Address Space Layout …

face
Unregulated use of facial recognition tech threatens people’s privacy, civil rights

Facial recognition tech is a boon to law enforcement, but without strict regulation and safeguards, it poses considerable risks to the privacy, civil liberties, and civil …

airplane
Major international law enforcement operation targets airline ticket fraud

193 individuals suspected of traveling with airline tickets bought using stolen, compromised or fake credit card details have been detained in a major international law …

Broken glass
Proliferation of vulnerable open source components creates growing risk

The continued and persistent use of components in software development is creating systemic risk in our digital infrastructure. A new Veracode report also found that companies …

GPG Sync
GPG Sync: Internal GPG keys syncing tool for orgs

First Look Code has released GPG Sync, an open source tool for keeping a list of GPG keys used by members of an organization always updated, and always available to all of …

Wireless
Public Wi-Fi: Users’ habits and perceptions of risk

A new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business users, including executives …

Don't miss

Cybersecurity news