Pre-packaged encryption, DDoS and news feed for tech-light jihadists. By Tim Greene Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown…
Month: May 2016
Sitting in the corner
Sitting in the corner, sometimes collecting dust, is an overlooked attack surface. By John Brandon They sit off in the corner, some of them collecting dust. Yet, a printer is…
Instagram hacked by 10-year-old boy
A 10-year-old Finnish boy named Jani has been given $10,000 (£7,000) after he found a security flaw in image-sharing social network Instagram. Dave Lee, North America technology reporter The boy,…
Gumtree Loses Customer Info in Data Breach
Ad posting website Gumtree has admitted to losing email addresses, names and phone numbers of some of its Australian customers, according to a report by The Register. By Michael Hill…
Alpha Payroll fires employee victimized by W-2 Phishing scam
BEC attack compromised all of the 2015 W-2 records produced by the firm for their clients. Punishing the victim of a crime feels wrong, but that’s exactly what happened to…
Can we trust cloud providers to keep our data safe?
Cloud computing – storing data and applications remotely rather than on your own premises – can cut IT costs dramatically and speed up your operations. By Matthew Wall, Technology of…