California to make it harder for your license plate to be tracked

In other words keep data-collecting, privacy-invading license plate cameras away from our cars. more…

Stock exchange finally fixes telnet router weakness

Oman’s stock exchange has fixed a serious router security misconfiguration. more…

Facebook plans European AI investment and digital training programs amid growing regulatory scrutiny

Facebook plans European AI investment and digital training programs amid growing regulatory scrutiny l33tdawg Mon, 01/22/2018 – 12:10 more…

UK top 500 legal firm credentials leaked on the Dark Web

UK top 500 legal firm credentials leaked on the Dark Web l33tdawg Mon, 01/22/2018 – 12:10 more…

Under the hoodie: what makes bug bounty hunters tick?

Where do they live? Why do they do it? HOW do they do it? HackerOne surveyed its registered ethical hackers to find out. more…

FAQ: Windows 10 LTSB explained

Windows 10 will power to its third anniversary this summer, but one branch, identified by the initials L-T-S-B, remains an enigma to most corporate users. LTSB, which stands for “Long-term Servicing Branch,” was among the pillars of Windows 10 in the months leading up to, and for months after, the mid-2015 roll-out of the operating […] more…

The people you call when you’ve had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group’s work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018. more…

6 ways hackers will use machine learning to launch attacks

Defined as the “ability for (computers) to learn without being explicitly programmed,” machine learning is huge news for the information security industry. It’s a technology that potentially can help security analysts with everything from malware and log analysis to possibly identifying and closing vulnerabilities earlier. Perhaps too, it could improve endpoint security, automate repetitive tasks, […] more…

Gemalto Licensing Tool Exposes ICS, Corporate Systems to Attacks

A significant number of industrial and corporate systems may be exposed to remote attacks due to the existence of more than a dozen vulnerabilities in a protection and licensing product from Gemalto. read more more…

UK Teen Gained Access to CIA Chief’s Accounts: Court

A British teenager managed to access the communications accounts of top US intelligence and security officials including the then CIA chief John Brennan, a London court heard Friday. Kane Gamble, now 18, was aged 15 and 16 when, from his bedroom in Coalville, central England, he managed to impersonate his targets to gain highly sensitive […] more…

Kaspersky Files Injunction to Expedite Appeal Against DHS Ban

Kaspersky Lab last week filed a motion for a preliminary injunction as part of its appeal against the U.S. Department of Homeland Security’s decision to ban the company’s products in federal agencies. read more more…

This week’s Bitcoin Atom fork: A quick primer

This week’s Bitcoin Atom fork: A quick primer l33tdawg Mon, 01/22/2018 – 01:23 more…

Only one road in the world leads from Russia to North Korea — and you can take a trip down it on Google Maps

Only one road in the world leads from Russia to North Korea — and you can take a trip down it on Google Maps l33tdawg Mon, 01/22/2018 – 01:23 more…

Here’s how to make sure Hawaii’s missile warning fiasco isn’t repeated

Here’s how to make sure Hawaii’s missile warning fiasco isn’t repeated l33tdawg Mon, 01/22/2018 – 01:22 more…

Determined to Find Love Online in 2018? Here are 5 Ways to Protect Your Privacy

It turns out January is the busiest month for online dating since millions of singles have resolved to embark on new adventures — and even finding love — in 2018. And why not? According to the Pew Institute, over the last ten years, online dating has lost a lot of its stigma, and a majority […] more…

How Pseudo-ransomware KillDisk Creates a Smoke Screen for Cybercriminals

We all remember Petya/NotPetya. How could you forget? The nasty malware took cues from WannaCry, leveraging the same SMB vulnerability. But instead of locking away files, Petya/NotPetya was a wiper – simply cleaning devices of their data. Petya was not the first wiper we’ve seen, and it’s certainly not the last. In fact, a classic […] more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News