US CERT update on Home Network Security
What is home network security? Home network security refers to the protection of a network that connects devices to each other and to the internet within a home. Whether it’s staying in touch with friends and family, paying your bills electronically, or teleworking, the internet…
Watch out. North Korea keeps getting better at hacking
WASHINGTON — In the latest indication that North Korea’s cyber operations are more sophisticated than commonly realized, computer security researchers have identified a group of government hackers and spies in the hermit kingdom who are capable of stealing documents from computers that aren’t connected to…
Sqreen wants to become the IFTTT of web app security
French startup Sqreen recently launched a Security Hub with dozens of plugins to put you in control of the security of your web app. In many ways, it feels like enabling tasks on popular automation service IFTTT. Sqreen participated in TechCrunch’s Startup Battlefield and Y…
Buckhacker : search engine to find servers that can be hacked
BuckHacker: A search tool that allows you to search leaky Amazon Web Services servers The lives of hackers has just been made a lot easier, thanks to a tool created by anonymous hackers that allows security researchers and cybercriminals to search for sensitive information stored…
IoT ramps up cyber security risk, says in-depth report
A new report finds that most organisations lack the right mix of strategy and execution to tackle rising threats to cybersecurity. And the Internet of Things (IoT) is a growing part of the problem. Chris Middleton presents some solutions. What keeps business people awake at…
Nintendo Switch has been hacked
HACKERS have managed to hack Nintendo’s latest video game console, thanks to a hard-coded flaw in the Nvidia Tegra X1 silicon inside. Read More
Tesla public cloud environment hacked, attackers accessed ‘non-public’ company data
Building a slide deck, pitch, or presentation? Here are the big takeaways: 73% of organizations allow the root user account to be used to perform activities, which goes against security best practices. — RedLock, 2018 Hackers broke into Tesla’s public cloud environment and gained access…
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program The Singapore Ministry of Defence (MINDEF) today announced the results of the first MINDEF Bug Bounty Challenge, which was facilitated by HackerOne, the leading hacker-powered security platform. The three-week program invited 300 ethical hackers to penetrate…
The Facts & Figures of failing cyber security over the last year
Add to favorites For so long the need to improve cyber security awareness and skills has been drilled into workers heads, so why is it still not happening and instead incident figures are rising? Cyber-attacks took over the news headlines in 2017, but despite the…
Artificial intelligence could supercharge hacking and election meddling, study warns
Breaking News Emails Get breaking news alerts and special reports. The news and stories that matter, delivered weekday mornings. In the 2020 election, you might not be able to believe your eyes or your ears due to advances in artificial intelligence that researchers warn could…
Stay connected