Tag: security

SEC guidelines push for clearer data breach disclosures

American companies haven’t always been forthright about disclosing data breaches in a responsible way, and regulators want to encourage better behavior. The Securities and Exchange Commission has issued “interpretive guidance” that it hopes w……



BitTorrent client exploits could let rogue websites control your PC

BitTorrent’s peer-to-peer app and its lightweight uTorrent counterpart are susceptible to particularly nasty hijacking flaws. Google researcher Tavis Ormandy recently detailed a host of DNS rebinding exploits in Windows versions of the softwar……


Nest adds Google Assistant to the indoor Cam IQ

The Nest Cam IQ is the smartest camera in the company’s security-oriented lineup, and now it’s even smarter. Today, Nest announced that the Cam IQ natively supports Google Assistant, thanks to an over-the-air update. It’s important to note, th……


US AG creates a new ‘Cybersecurity Task Force’

Days after the Mueller investigation revealed indictments against 13 Russian nationals for election tampering, US Attorney General Jeff Sessions announced a new Cybersecurity Task Force. Its marching orders are a bit vague — “canvass the many……


Research finds Facebook holds personally identifiable data on 40% of EU population

The EU’s massive General Data Protection Regulation (GDPR) will go into effect on May 25, which introduces harsher restrictions on how businesses can use and store the personal data of their customers. This will greatly affect foreign tech companies th……


Intruders ‘borrowed’ Tesla’s public cloud for cryptocurrency mining

Tesla isn’t immune to the plague of cryptocurrency mining hijacks, it seems. Security researchers at RedLock have reported that intruders gained access to Tesla’s Kubernetes console (where it deploys and manages containerized apps) without ne……


Air Force security hackathon leads to record payout

The US Air Force’s second security hackathon has paid dividends… both for the military and the people finding holes in its defenses. HackerOne has revealed the results of the Hack the Air Force 2.0 challenge from the end of 2017, and it led……


Why Edward Snowden supports anonymous cryptocurrencies

In light of recent events, the importance of financial privacy has become an increasingly unavoidable issue for cryptocurrency users. With the exception of anonymous cryptocurrencies, the lack of privacy measures on most leading public blockchain netwo……


‘China’s gift to Africa’: How China spied on the African Union via donated computers

For a period of 5 years, China continued to spy on all electronic communications at the African Union’s headquarters in Addis Ababa, Ethiopia. The Chinese spy operation continued throughout this period without being detected until some network administ……