Police investigate ‘first cyber-flashing’ case
Police are investigating a “new” crime of cyber-flashing after a commuter received an indecent image on her phone as she travelled to work. The …
Google discloses three severe vulnerabilities in Apple OS X
Google’s Project Zero security team revealed the existence this week of three vulnerabilities with high severity that have yet to be fixed in Apple’s …
Fuel tank gauges vulnerable to attackers
The serial port interfaces of nearly 6,000 automated tank gauges (ATG) — 5,300 of them in the U.S. — aren’t password protected, leaving them …
Finland Abolishes Copyright Levies On Digital Devices
As we’ve noted before, copyright levies — effectively a tax on blank storage media — are becoming ever-more anachronistic and unworkable. So it’s good …
North Korea Didn’t Do It: Expert Hacker Believes Sony Hack Was An Inside Job
North Korea is innocent of the Sony hack, according to expert hacker and cyber security pro Marc W. Rogers. Rogers has managed security for …
Japan Court Orders Google To Remove Search Results
A Japanese judge has ordered Google to remove search results of a man’s unflattering past in an order the plaintiff’s lawyer compared to Europe’s …
Cyber crime: First online murder will happen by end of year, warns US firm
Governments are ill-prepared to combat the looming threat of “online murder” as cyber criminals exploit internet technology to target victims, the European policing agency …
9 Resources to Stay Current on Security Threats
In the world of IT security, threats are constantly evolving and shifting. It’s critical to stay abreast of the current (and hopefully future) threat …
Which VPN Services Take Your Anonymity Seriously? 2014 Edition
Millions of people use a VPN service to protect their privacy, but not all VPNs are as anonymous as one might hope. In fact, …
Recent Comments