This is not any ordinary year, but, for now, at least, we have football to help keep our minds off our troubles. | Continue reading
Asks for more work to be done to ensure the technology conforms to privacy rights and expectations. | Continue reading
Equinix says ransomware hit internal systems but that data centers are OK. | Continue reading
Cyber insurance claims ranged in size from $1,000 to well over $2,000,000 per security incident. | Continue reading
Grants of up to $625,000 will be issued in exchange for cryptocurrency tracking technologies. | Continue reading
Like many businesses, the government wants to achieve a digital transformation. It might try to start with appointing a leader. | Continue reading
Want an easy way to deal with Kubernetes's complexities? Mirantis updates to the Lens Kubernetes integrated development environment may be just what you need. | Continue reading
All devices using the Bluetooth standard 4.0 through 5.0 are vulnerable. Patches not immediately available. | Continue reading
Academics: Only 82 of the 629 commercial cyber-security reports (13%) published in the last decade discuss a threat to civil society, with the rest focusing on cybercrime, nation-state hackers, economic espionage. | Continue reading
Norway's Parliament, Stortinget, says hackers gained access and downloaded content for "a small number of parliamentary representatives and employees." | Continue reading
Some of the most important networks and systems today are woefully outdated. And that isn't always a bad thing. | Continue reading
AWS protesting Microsoft's DoD JEDI cloud contract victory is a foregone conclusion. AWS, however, directly blames President Donald Trump for "blatant cronyism" being behind the DoD's decision. | Continue reading
Cyber conflict isn't about cyberwar, says The Grugq. It's about a global cyber power struggle that never ends, where even K-pop bands can influence nation states. | Continue reading
Former Horry County IT security director sentenced to two years in federal prison. | Continue reading
The new G-Technology ArmorLock encrypted NVMe SSD was designed to offer professionals a high-performance drive that's highly secure but still easy to use. | Continue reading
Over the past week, multiple ISPs in Belgium, France, and the Netherlands reported DDoS attacks that targeted their DNS infrastructure. | Continue reading
Fedora, Red Hat's community Linux for developers, is finally available from a mainstream PC vendor, Lenovo. | Continue reading
App mimicked a popular anti-government news site and collected location and device owner details. | Continue reading
The number of iPhones Apple now sells is actually below 2014 numbers. So, why is the company making more money than King Midas? We look for answers in some lovely charts. | Continue reading
Apps, mostly linked to China, accused of sending data outside of India and undermining its sovereignty. | Continue reading
CISA and the FBI issue a joint statement about election and voter database hacking threats after a misleading article in Russian media today. | Continue reading
MoFi Network patched only six of ten reported vulnerabilities, leaving three hard-coded undocumented backdoor systems in place. | Continue reading
Researchers say the six apps had combined total of 200,000 downloads - and users who installed them should delete them. | Continue reading
A standards guide on how to use algorithms across government. | Continue reading
Online advertisers don't need huge lists of the sites we access. Just 50-150 of our favorite sites are enough. | Continue reading
Nextcloud, the popular open-source Infrastructure-as-a-Service (IaaS) cloud, now enables you to automatically scan your files for malware before they can be stored in your private cloud. | Continue reading
From their very inception, tech companies haven't been keen on privacy. They've also not been keen on making privacy controls easy. As court documents just revealed. | Continue reading
Malicious code was hidden inside a JavaScript library for working with the "Fall Guys: Ultimate Knockout" game API. | Continue reading
White Ops discovers a collection of Android apps that installed a hidden browser to load ad-heavy pages and commit ad fraud. | Continue reading
Cisco said it discovered the attacks last week during a support case the company's support team was called in to investigate. | Continue reading
The engineer was responsible for damage that cost Cisco $2.4 million to rectify. | Continue reading
Iranian hackers impersonated journalists from German TV Deutsche Welle and Israeli magazine Jewish Journal, and the Wall Street Journal in earlier attacks this year. | Continue reading
Researchers: "In other words, the PIN is useless in Visa contactless transactions." | Continue reading
Operators have changed their tactics in the quest for data theft. | Continue reading
A Russian hacker tried to recruit a Tesla employee working for the company's factory in Sparks, Nevada. | Continue reading
The decision to leave, after joining on June 1, is due to the political environment 'sharply' changing. | Continue reading
Academics also discover many new previously unreported JavaScript APIs that are currently being used to fingerprint users. | Continue reading
29-years in the making, the Linux kernel just accepted its millionth commit. The greatest open-source project of all time has come a long way from its "hobby" beginnings. | Continue reading
A Russian national traveled to the US to recruit and convince an employee of a Nevada company to install malware on the company's network. | Continue reading
While both Apple and Google are in US and EU crosshairs, Apple is in a far more precarious position. Are iOS users ready for the pros and cons of opening Pandora's app box? | Continue reading
Safari bug could be abused to leak or steal files from users' devices. | Continue reading
University officials restored from backups, but they had to pay the ransomware gang to prevent them from leaking student data. | Continue reading
Company also urges app devs to start using newer web tech like HTTP/2 and TLS 1.3, citing similar performance and speed improvements. | Continue reading
Attackers could have sent spoofed emails mimicking any Gmail or G Suite customer. | Continue reading
GNOME Evolution, KDE KMail, IBM/HCL Notes, and older versions of Thunderbird found to be vulnerable. | Continue reading
Despite rumors to the contrary, Mozilla's Thunderbird e-mail client will live. | Continue reading
Technology convergence allows for safer automated traffic lights with less waiting. | Continue reading
Binary Defense researchers have identified a bug in the Emotet malware and have been using it to prevent the malware from making new victims. | Continue reading