Tech giants including Apple, Cisco, and Mozilla have criticised the Australian government for wanting to introduce laws that would allow for access to encrypted content. | Continue reading
The bug can be exploited to gain access to photos stored on a user's device. | Continue reading
Republican senators start inquiry in Google's handling of Google+ security breach. | Continue reading
The highly popular PHP 5.x branch will stop receiving security updates at the end of the year. | Continue reading
Cloud Identity is built on Google's BeyondCorp security model and previously sat within G Suite. The company is also moving to be more of an Okta competitor. | Continue reading
Fuchsia is Google's mystery operating system. At the recent Linux Security Summit, the NSA revealed what they've found out about it to date. | Continue reading
Internet vigilante claims he patched over 100,000 MikroTik routers already. | Continue reading
Some see this as a giant leap forward for Microsoft and open source. A few, however, see Microsoft's open-source patent move as just more of the same old, same old. | Continue reading
Google's cloud data warehouse service to be deployed across the globe; its GIS features reach the beta milestone. | Continue reading
The Gallmaker hacking operation has been active since December 2017 and appears to have been carried out by an organisation 'more knowledgeable and skilled' than most espionage groups. | Continue reading
Exact number of affected users is unknown but the server cluster is now secure. | Continue reading
Company hacked again despite claiming to have boosted security measures and undergone a security audit. | Continue reading
The move opens up Microsoft's 60,000 patents to Open Invention Network members who are using them in the Linux system. What does that mean, specifically? Read on. | Continue reading
We don't know what the next HoloLens will look like, but we've seen the depth sensor that will be inside. Here's how it works. | Continue reading
Bug only affects WhatsApp for Android and iOS, but the issue has been fixed this week. | Continue reading
By joining the Open Invention Network, Microsoft is offering its entire patent portfolio -- with the legacy exception of its Windows and desktop application code -- to all of the open-source patent consortium's members. | Continue reading
Re-branded IP cameras and DVRs sold by over 100 companies can be easily hacked, researchers say. | Continue reading
The critical vulnerability can lead to the execution of code on a vulnerable system. | Continue reading
A bug previously deemed medium in severity may actually be as "bad as it gets" due to a new attack technique. | Continue reading
Across 945 breach incidents that occurred mainly in the United States and Australia. | Continue reading
An unsecured MongoDB server containing 19GB in customer and product data was exposed online. | Continue reading
Malicious code removed after two days. Impact is smaller compared to previous incidents at Ticketmaster, Feedify, or British Airways. | Continue reading
Really, Google? I know not many of us used your Google+ social network, but those of us who did use it really, really liked it. | Continue reading
Redis put some of the program's code under the anti-open-source Common Clause license. Now, developers are counterattacking by forking the code. | Continue reading
Search giant says it found no evidence that any user data was misused. | Continue reading
This chip is squarely aimed at high-end Xeon workstations tackling heavy-duty multithreaded applications. | Continue reading
Police officer also advertised a system to track the location of buyers' gang rivals or spouses based on the telephone numbers. | Continue reading
Are our AI devices really listening to our every word? And if they are -- how can we stop them? | Continue reading
Deep learning neural networks are behind much of the progress in AI these days. Neuton is a new framework that claims to be much faster and compact, and it requires less skills and training than anything the AWSs, Googles, and Facebooks of the world have. | Continue reading
The Phantom Secure network was used to help criminals "go dark" and avoid law enforcement. | Continue reading
Updated: An investigation claims that a tiny chip implanted into server hardware facilitated backdoors into the systems of major tech companies and US government entities. | Continue reading
Equipment seized by Dutch intelligence points to Russia's involvement in hacking incidents around the world. | Continue reading
In 2018, some developers fail to deactivate debug mode for their web apps, leading to potentially catastrophic scenarios. | Continue reading
Ethical hackers paid over $150,000 for finding and disclosing bugs. | Continue reading
The hacking rings may be separate but it seems they share a system or two in order to launch their attacks. | Continue reading
The two foundational Hadoop companies announce their intention to merge. Is it a whole greater than the sum of parts, or a shotgun wedding? And what's the combined company going to be called? | Continue reading
Google: This feature is good for you, so we'll just enable it. You're welcome! | Continue reading
The new IBM Secure Service Container brings a new layer of security to IBM LinuxONE and Z mainframes. | Continue reading
Facebook is pushing forward with its own open-source machine learning (ML) and artificial intelligence (AI) framework. | Continue reading
The Indian online office suite is reportedly being abused on a massive scale to exfiltrate data from compromised machines. | Continue reading
Poor debit card security and a "series of errors" in reporting exacerbated an incident that could have been easily avoided. | Continue reading
Reports claim that law enforcement used a search warrant to force an iPhone owner to unlock their device through their face. | Continue reading
Google publishes new rules for extensions and the Chrome Web Store. | Continue reading
Facebook was fined £500,000 under the Data Protection Act for the Cambridge Analytica scandal but may not get away so lightly this time. | Continue reading
If Facebook and Twitter can't control what happens on their sites, perhaps an election moratorium would help. It might have many beneficial consequences. | Continue reading
Twitter announces three new major rule changes to its site rules and policies. | Continue reading