NCIX did not wipe or encrypt servers when it closed down and filed for bankruptcy in 2017. Their customers' data is now peddled online by Richmond-based individual. | Continue reading
Attackers gained access to some AdGuard accounts but company can't tell how many. | Continue reading
Fresh from rushing the legislation into Parliament, the government will ram its legislation through the Parliamentary Joint Committee on Intelligence and Security. | Continue reading
ZDNet talks to a former infamous hacker whose "mostly true" book offers a glimpse into the minds of Eastern Europe's cybercriminals. | Continue reading
Google says third-party developers can access users' Gmail, but it manually vets them first and uses machine learning to monitor apps. | Continue reading
Malicious code redirects users to tech support scams, some of which use new "evil cursor" Chrome bug. | Continue reading
Flutter aims to help developers build native app interfaces for both iOS and Android. | Continue reading
A little-known Windows feature will create a file that stores text extracted from all the emails and plaintext-files found on your PC, which sometimes may reveal passwords or private conversations. | Continue reading
Ubuntu VMs can now be launched from Hyper-V Quick Create and use RDP for enhanced session mode. | Continue reading
Linus Torvalds, Linux's creator, has decided he needs to change his ways and how the Linux community works together. Now, if only other technology leaders would follow his lead. | Continue reading
Facebook has to run lots of live tests to figure out which configurations are best for its HTTP servers, and it sped up the search for optimal settings by employing a machine learning approach called Bayesian optimization to narrow the list of plausible solutions. | Continue reading
SUSE and Microsoft have the longest running partnership between Linux and Windows. Here's where they've been, where they are now, and where they're going tomorrow. | Continue reading
In the aftermath of Linus Torvalds apologizing for how he's been running the Linux kernel community, Linux has adopted a new code of conduct. But some now claim this means Linux is being taken over by social justice warriors. | Continue reading
The research could provide a way to generate larger data sets for training AI systems that analyze brain tumors. | Continue reading
The previously unknown security flaw in Nuuo software is thought to impact hundreds of thousands of devices worldwide. | Continue reading
Linux's creator is stepping back from his Linux kernel work -- to work instead on his behavior toward other developers. | Continue reading
A middle-power nation thinking it can tell US-based multinationals which parts of mathematics they can and cannot use -- we deserve to be sent to time out. | Continue reading
When you watch football, soccer, baseball, or any sport with online streaming, you're actually watching video that's seconds behind. Limelight thinks it has the answer to this annoyance. | Continue reading
Vulnerability most likely affects any iOS and macOS app that uses the WebKit rendering engine to display web pages. Apple is investigating. | Continue reading
Around 95 percent of all ransomware payments were laundered through Vinnik's BTC-e platform. | Continue reading
The Australian National University believes the new invention could result in a device that links quantum computers to an optical fibre network. | Continue reading
But which half? Too much effort by developers is wasted on debugging, maintaining and fixing bad code. | Continue reading
Adobe announces plans to integrate Magento bug bounty program into existing vulnerabilities disclosure platform that offers no monetary rewards to bug hunters. | Continue reading
People often talk about a skills shortage in cyber security - could hiring those with a murky past be the answer? Or is it too risky? | Continue reading
Bulk data collection revealed by Edward Snowden has been been found to violate privacy rights of UK citizens. | Continue reading
The severe memory corruption flaw permitted attackers to execute malware at the kernel level. | Continue reading
Senators demand answers after government report finds that only 11 percent of the Department of State's devices use multi-factor authentication. | Continue reading
Security researchers find a new way to disable current cold boot attack firmware security measures to steal sensitive data from high-value computers. | Continue reading
In one of the dumbest technology regulation moves since the US's FCC destroyed America's net neutrality, the European Union's copyright law overhaul promises to wreck today's internet. | Continue reading
Starting in October, Chromebook users will be able to access files natively on Windows PCs and Windows and Samba file servers. | Continue reading
And just one mistake can compromise an entire organisation. | Continue reading
Want a full-featured, easy-to-run, open-source Infrastructure-as-a-Service cloud to call your own? Check out the latest version of Nextcloud. | Continue reading
California IoT security bill criticized by security researcher. Expert says bill "is based upon an obviously superficial understanding of the problem." | Continue reading
An attack technique has been revealed which allows threat actors to unlock a Tesla vehicle in no time at all. | Continue reading
Security researchers find clues connecting the Magecart group to the breach at British Airways. | Continue reading
The company has now removed a browser history data collection feature from its macOS products. | Continue reading
A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable. | Continue reading
In October, Chrome and Firefox users will be blocked from websites still using insecure Symantec/DigiCert TLS certificates. If you don't want to tick off your users, you need to replace these security certificates as soon as possible. Here's how to lock down your site properly. | Continue reading
New malware persistence method works only on Windows 10 and abuses built-in UWP apps like the Cortana and People apps. | Continue reading
A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable. | Continue reading
Three months after acquiring GitHub, Microsoft is rebranding and repositioning its VSTS coding collaboration service as 'Azure DevOps,' | Continue reading
I have always been a tolerant and loyal opposition user of Cupertino's products. Now I am committed to using them, forever. | Continue reading
When you think of open-source software, you think about smartphones, servers, and the cloud. You probably don't think about movies, but you should. | Continue reading
Opinion: To sign up for Google's Advanced protection program, you must buy security keys from a Chinese vendor. Security questions have since been raised considering current intelligence laws in China. | Continue reading
New Russian-speaking "Silence" group linked to the theft of at least $800,000 from Russian and Eastern European banks and financial institutions. | Continue reading
Tainted extension caught stealing passwords for Google, Microsoft, GitHub and Amazon accounts, but also Monero and Ethereum private keys. | Continue reading
Google revamps Chrome main user interface with new white rounded tabs, replacing classic gray angled tabs after a decade. | Continue reading
In a wide-ranging interview at Open Source Summit, Torvalds talked about programmers, Linux, and open-source development. | Continue reading