A huge collection of 3400+ free website templates, WP themes and more http://jartheme.com/ at the biggest community-driven free web design site.
Thursday, September 1, 2016
Blog
Apple has put a lot of work into making its phones hard to crack, much to the consternation of US law enforcement officials. It's still not perfect, however, as researchers from John Hopkins University have discovered a flaw that...
What do developers do after discovering a software vulnerability? Why, patch it, of course. Ironically, criminals have learned that lesson too, as one gang has updated the notorious TeslaCrypt ransomware with new features that are impossible to crack, according...
After a two-year, invitation-only beta, ProtonMail has opened its privacy email service to the public and launched new mobile apps. The app is encrypted end-to-end and, like Apple's iPhone, can't even be accessed by the company itself. It also...
Hackers stole $80 million from a bank, but it could have been a lot worse if they had just Googled the name of a company, according to Reuters. Thieves got inside servers of the Bangladesh Bank, stealing the credentials...
OpenWorks A group of English engineers have developed a new device for downing quadcopters that stray into restricted airspace: the SkyWall 100. This shoulder-mounted net launcher weighs 22 pounds and runs on compressed gas but does reportedly offer...
As Apple continues to battle the FBI in favor of device encryption, it appears that Amazon has quietly gone the other way. According to several owners of Amazon's tablets, the latest Fire OS 5 update actually removes encryption support...
AP Photo/Farah Abdi Warsameh Seaborne pirates just borrowed a page from their land-based counterparts. A Verizon security report has revealed that raiders hacked a shipping company's content management system to determine which ships were worth boarding, and where the...
MF3d via Getty Images Unless you've just finished an incredibly dedicated Rip Van Winkle cosplay session, you're probably well aware of how hot a topic encryption is at the moment. To that end, the winners of the 2015 A.M....
Windows Defender has offered a baseline level of PC security for years, but that's not really going to cut it in an era when data breaches and other large-scale cyberattacks are virtually commonplace. That's why Microsoft is stepping up...
Businesses do a lot to secure their operations, but often it just takes one rogue employee to send themselves confidential files and they're doomed. Google launched its Data Loss Prevention (DLP) service to help companies avoid such a calamity,...
The US and EU have published a big pile of documents that spill the beans on the pair's replacement for Safe Harbor. The new provision is known as the EU-US Privacy Shield and is designed to limit how much...
In a recent interview about Apple's ongoing legal battle with the Department of Justice, Tim Cook said that our smartphones have more information about us and our families than any other device we own. He's right. And if the...
The Internal Revenue Service already increased the total number of accounts accessed in last year's cyber attack once. Today, it's raising the number gain. The IRS announced that during a 9-month review of the incident, it discovered that an...
The University of California, Berkeley is warning 80,000 people -- including current and former students, faculty and vendors -- that hackers have accessed a computer system that stored their Social Security and banking information. The university says it has...
When I read about MasterCard's plan to do selfie security with purchases, I wondered what the first massive breach of biometric data is going to look like. Unlike passwords, biometrics such as face mapping, fingerprints and iris scans can't...
The distributed denial-of-service attack, better know as a DDoS, is one of the more basic but effective ways of shutting down a website you might want to torment. Often, hackers use them to silence sites who hold viewpoints they...
Remember when the head of the FBI swore blind that authorities only wanted backdoor access to the iPhone in this one, special case? Turns out that his friends over at the Justice Department just blew that claim miles out...
An eight-year-old bug in the Internet's Domain Name Service (DNS) could be used to widely spread malware, according to security research Dan Kaminsky. He says a flaw found in the Gnu C standard library, aka "glibc," can trick browsers...
Some Linux fans just got a hard lesson about the importance of double-checking install files. The Linux Mint team is warning users that hackers compromised the ISO (drive image) downloads for 17.3 Cinnamon on February 20th, pointing people toward...
Shutterstock A Hollywood hospital is having to rely on pencil and paper after a ransomware attack. For more than a week, the computer systems at Hollywood Presbyterian Memorial Medical Center have been down at the hands of hackers. In...