security

Wi-Fi 6 Officially Launches Today, With Up to 3x the Performance of 802.11ac

This site may earn affiliate commissions from the links on this page. Terms of use. The Wi-Fi 6 standard has officially launched today and the Wi-Fi Alliance is now handing out Wi-Fi 6 certifications to manufacturers with qualifying hardware. We’ll start seeing devices and equipment with Wi-Fi 6 support hitting the market in the near […]

Wi-Fi 6 Officially Launches Today, With Up to 3x the Performance of 802.11ac Read More »

ICE is paying an Israeli security company $30M to break into phones

The US Immigration and Customs Enforcement (ICE) has expanded its partnership with Israeli digital forensics firm Cellebrite to unlock and extract data from mobile phones, reports The Daily Beast. According to a federal filing dated June 24, the ICE is expected to pay the company anywhere between $30 and $35 million for an order to

ICE is paying an Israeli security company $30M to break into phones Read More »

‘Eva Richter’ Scam Encrypts Your Files By Posing As A Fake Resume

Opening a job email titled “Bewerbung via Arbeitsagentur – Eva Richter” (Application via Employment Agency – Eva Ritcher) could prove disastrous to you, according to a new report. Bleeping Computer, a website dedicated to reporting on Cybersecurity, confirmed the existence of an “Eva Ritcher” fake resume scam. The scam targets people in Germany by attaching

‘Eva Richter’ Scam Encrypts Your Files By Posing As A Fake Resume Read More »

3 Digital Security Threats Your Business May Be Overlooking

You’ve may have heard that cybercriminals keep one step ahead of the “good guys” tasked to catch them or thwart their schemes. The picture gets even more bleak when you think about the implications of that statement. Crime fighters are always a step behind—and they are supposed to be the pros, the experts whose job

3 Digital Security Threats Your Business May Be Overlooking Read More »

New clues show how Russia’s grid hackers aimed for physical destruction

Joshua Lott/Bloomberg via Getty Images For nearly three years, the December 2016 cyberattack on the Ukrainian power grid has presented a menacing puzzle. Two days before Christmas that year, Russian hackers planted a unique specimen of malware in the network of Ukraine’s national grid operator, Ukrenergo. Just before midnight, they used it to open every

New clues show how Russia’s grid hackers aimed for physical destruction Read More »

Attackers actively exploiting ‘Simjacker’ flaw to steal device data and spy on individuals

Cybersecurity researchers have warned of a critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims without their knowledge just by sending an SMS. Dublin-based firm AdaptiveMobile Security said the flaw — dubbed “Simjacker” — has been actively exploited for at least two years by a

Attackers actively exploiting ‘Simjacker’ flaw to steal device data and spy on individuals Read More »

‘Digital transformation requires a change of mindset’

Digital transformation requires more wholesale change than some industry leaders may assume, as Red Hat chief technologist Ian Hood explains. Ian Hood is chief technologist at global services provider Red Hat. In his role, he acts as a strategic adviser to the company’s community of customers and partners. Prior to this, he was responsible for

‘Digital transformation requires a change of mindset’ Read More »

iOS 13 To Ship With An Exploit That Bypasses Your Lock Screen

Apple plans to release iOS 13 on September 19th, and it’s no surprise that the upcoming release includes many fascinating features. But it appears that the new iOS 13 features will be also be accompanied by exploits as well. A security researcher has found a way to bypass the lock screen of an iPhone running

iOS 13 To Ship With An Exploit That Bypasses Your Lock Screen Read More »

Why Do Android Flashlight Apps Need Dozens of Permissions?

This site may earn affiliate commissions from the links on this page. Terms of use. No one should be downloading a flashlight app in the Year of Our Lord 2019 — that’s why both Google and Apple have integrated the ability into their devices as part of the base operating system. Avast security researcher Luis

Why Do Android Flashlight Apps Need Dozens of Permissions? Read More »

You Can Now Try the Firefox Private Network

Mozilla has relaunched its Test Pilot program, and kicked things off with a new project codenamed Firefox Private Network. This is essentially a VPN designed to protect you and your information when you’re browsing the web using Firefox. Mozilla has been ramping up its security and privacy credentials of late. Firefox has started blocking third-party

You Can Now Try the Firefox Private Network Read More »

WP Twitter Auto Publish Powered By : XYZScripts.com
Exit mobile version