Did you ever wonder if your Twitter account has been hacked and who had managed to gain access and when it happened? Twitter now lets you know this. After Google and Facebook, Twitter now lets you see all the devices—laptop, phone, tablet, and otherwise—logged into your Twitter account. Twitter has recently rolled out a new
Philip Choo
Venture capital is known for being an opaque industry, so it’s no surprise most of us have no idea what the average VC earns in a year. I got a closer look at the survey results of J. Thelander Consulting‘s annual venture firm compensation survey and, unsurprisingly, VCs make a lot of money. Just how much? Well,
Remember 3D Touch? Unless you’re a power iOS user you probably don’t. Or, well, you’d rather not. It’s been clear for some time now that the technology Apple lauded at its 2015 unveiling as the “next generation of multi-touch” most certainly wasn’t. For the mainstream iPhone user it’s just that annoying thing that gets in
The ICO has received 500 calls each week to its breach reporting helpline since the GDPR came into force in May, but around a third of these don’t meet the minimum threshold, according to the deputy commissioner of operations. James Dipple-Johnstone told the CBI Cyber Conference in London this week that the UK privacy watchdog
by Lisa Vaas Do you feel lucky? Well, do ya, punk? Then go right ahead and hit the “buy” button to pick up a movie on iTunes. Then, be ready to kiss that movie goodbye if Apple loses the rights to distribute it. Yes, it turns out Apple’s iTunes shop is more of a “store
A browser is our connection to the world wide web – it allows us to access websites, gain information, make online purchases, the list goes on. As the key to our internet usage, browsers can also be the key to unlocking our personal information. So, unfortunately, browser flaws can have a major impact on users.
In its heyday, Kelihos comprised up to 100,000 compromised devices that were capable of blasting out billions of malware-laden emails every day A Russian national has pleaded guilty in a US court to operating Kelihos, one of the longest-running and most pernicious botnets that was used, for almost seven years, to send untold numbers of spam
The Russian man who was accused of operating the infamous Kelihos botnet has finally pleaded guilty in a U.S. federal court. Peter Yuryevich Levashov, 38, of St. Petersburg, Russia, pleaded guilty on Wednesday in U.S. federal court in Connecticut to computer crime, wire fraud, conspiracy and identity theft charges. Levashov, also known by many online
Last week, onstage at TechCrunch Disrupt, regulator Jina Choi, who heads the SEC’s wide-reaching San Francisco unit, declined to confirm or deny that the SEC is investigating Tesla CEO Elon Musk for possible fraud. Said Choi, “I can’t tell you about any particular investigation in our office. And I can’t confirm or deny the existence
The complaints in this case were lodged prior to the UK legislating for a new surveillance regime, the 2016 Investigatory Powers Act, so in coming to a judgement the Chamber was considering the oversight regime at the time (and in the case of points 1 and 3 above that’s the Regulation of Investigatory Powers Act
Thank you for joining! Access your Pro+ Content below. March 2016 How to buy the best antimalware tools to protect endpoints Share this item with your network: Malware writers are becoming more sophisticated, increasing the threats to data privacy and security. To counter the growing risks of unauthorized access to proprietary or confidential information, the
The website of Edinburgh University was still down at the time of writing after the institution suffered a major cyber-attack during its Freshers’ Week. Service provider Jisc told local reporters that it believes the university’s is the only domain affected. A spokesman told the Edinburgh Evening News that the university has “rigid measures in place”
by Danny Bradbury California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post. The State legislature approved ‘SB-327 Information privacy: connected devices’ last Thursday and handed it over to the Governor to sign. The legislation introduces security requirements for connected devices sold in
Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created a toaster that could be turned on and off over the internet for the October ’89 INTEROP conference. Then in 2000, LG announced its first internet refrigerator plans. So on and so forth IoT grew
Microsoft and Adobe have each shipped out their scheduled batches of patches to address security flaws in their respective software. Microsoft’s Patch Tuesday this month is addressing 61 security flaws in Windows and other software, notably in web browsers Internet Explorer and Edge, as well as in Office, Sharepoint, Hyper-V, and the .NET Framework. Seventeen
Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S luxury sedans in less than two seconds. Yes, you heard that right. A team of researchers from the Computer Security and Industrial
Apple always drops a few whoppers at its events, and the iPhone XS announcement today was no exception. And nowhere were they more blatant than in the introduction of the devices’ “new” camera features. No one doubts that iPhones take great pictures, so why bother lying about it? My guess is they can’t help themselves.
The European Parliament has just voted to back controversial proposals to reform online copyright — including supporting an extension to cover snippets of publishers content (Article 11), and to make platforms that hold significant amounts of content liable for copyright violations by their users (Article 13). Today’s plenary vote in the European parliament was on
When identity and access management doesn’t get the attention it deserves, there tends to be trouble. For both cloud and on-premises systems, a strong set of security access controls and a tight grasp on identity governance can save enterprises from data exposure or data loss, embarrassment and a damaged reputation. Enterprise systems are becoming increasingly
Microsoft released fixes for over 60 CVEs yesterday as part of its monthly update round, three of which have been publicly disclosed and one which was being actively exploited in the wild. CVE-2018-8440 is an Elevation of Privilege vulnerability in Windows Advanced Local Procedure Call (ALPC) which was disclosed by researcher and Twitter user @SandboxEscaper
by Paul Ducklin Fancy driving a Tesla, but can’t convince your local dealer to let you have a go? If it’s a Model X you’re after, and you don’t mind going to prison for a while if you get caught, you might now be able to fulfil your dream. Cybersecurity researchers at the Catholic University
A domain name once left behind can catch up with you – by giving fraudsters access to a treasure trove of sensitive information Cybercriminals can use an abandoned domain name to obtain all manner of private information belonging to the company that formerly owned the domain, as well as to its clients and employees, a
Times to gear up your systems and software. Just a few minutes ago Microsoft released its latest monthly Patch Tuesday update for September 2018, patching a total of 61 security vulnerabilities, 17 of which are rated as critical, 43 are rated Important, and one Moderate in severity. This month’s security updates patch vulnerabilities in Microsoft
Sorry Santa Claus, Jeff Bezos is your Father Christmas now. Amazon, in its ongoing quest to utterly dominate the holiday season, has announced plans to start shipping real, live Christmas trees, come November. That news comes courtesy of The Associated Press, which notes that the seven-foot-tall Douglas firs and Norfolk Island pines will be sent
by John E Dunn Is the Keybase secure messaging browser extension safe to use or not? Respected researcher Wladimir Palant (of AdBlock Plus fame) is so convinced that it isn’t that he has recommended users “uninstall the Keybase browser extension ASAP,” after he discovered what looks like a gap in its claim to offer end-to-end
Keeping pace with online threats can often feel like you’re plugging holes in a dam with your fingers, as soon as you’ve got one challenge under control, another issue pops up somewhere else. As employers create more flexible work conditions (BYOD, remote workforce, etc. and as mobility increases, organizations are faced with an increasingly complex
Celebrated every year on September 8, this year’s theme for International Literacy Day focused on “Literacy and Skills Development.” And this made me instantly think of digital literacy and why we need to push digital skill development among the populace. It does not take much time to move from pen and paper to keyboard and
The several thousand glowing reviews that Adware Doctor had garnered prior to its removal were “likely fake”, researchers say Apple has pulled a highly popular app from the Mac App Store after security researchers found that the app secretly logged and sent the browsing histories of its users and other sensitive data to remote servers.
Zerodium, the infamous exploit vendor that earlier this year offered $1 million for submitting a zero-day exploit for Tor Browser, today publicly revealed a critical zero-day flaw in the anonymous browsing software that could reveal your identity to the sites you visit. In a Tweet, Zerodium shared a zero-day vulnerability that resides in the NoScript
The perennial optimists at the Search for Extraterrestrial Intelligence, or SETI, have joined the rest of the world in deploying AI to help manage huge datasets — and their efforts almost instantly bore fruit. 72 new “fast radio bursts” from a mysteriously noisy galaxy 3 billion miles away were discovered in previously-analyzed data by using