Megaupload’s Kim Dotcom gets back some of his seized property, and receives right to see evidence against him
Kim Dotcom has won back the right to see all the evidence against him – before, rather than after, his possible extradition to the US to answer charges of racketeering, money laundering, online piracy and copyright infringement. more…Megaupload’s Kim Dotcom gets back some of his seized property, and receives right to see evidence against him
Kim Dotcom has won back the right to see all the evidence against him – before, rather than after, his possible extradition to the US to answer charges of racketeering, money laundering, online piracy and copyright infringement. more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…Assessing the impact of protection from web miners
Brief summary: We present the results of evaluating the positive economic and environmental impact of blocking web miners with Kaspersky products. The total power saving can be calculated with known accuracy using the formula <w>·N, where <w> is the average value of the increase in power consumption of the user device during web mining, and […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set to be filled with many must-see moments. For those occasions where a television isn’t close by or the content is not freely available, many of us may resort to streaming services so that we can […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…Kim Dotcom faces extradition to the US
A New Zealand court ruled on Monday that internet entrepreneur Kim Dotcom could be extradited to the United States to face charges relating to his Megaupload website, which was shut down in 2012 following an FBI-ordered raid on his Auckland mansion. The Auckland High Court upheld the decision by a lower court in 2015 on […] more…Hacktivist Group CyberBerkut Behind Attacks on German Official Websites
A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able to gather some information on some of its members based on Pastebin data that had been leaked by the Ukrainian nationalist political party (Pravy Sektor). A Background on CyberBerkut CyberBerkut is an organized group […] more…Securing the Internet of Everything
Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let me explain. When a company creates a smart device, they not only need to create the hardware for […] more…More information
- Xiaomi under investigation for sending user info back to China
- Using Cyber War Games to Improve Incident Response
- DoCoMo app shares SIM credentials with offline devices
- SAP Patches Critical Vulnerability in BusinessObjects
- How do you set up a VPN on Windows 8?
- S.C. governor’s post-breach data encryption claims are off-base, analysts say
- Rumor: Apple to open R&D and data center facilities in China
- Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA
- Kaspersky Lab Adds $100K Payout to Bug Bounty Program
- EU air passenger database about to take flight, but critics want it grounded