Microsoft’s .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.
Microsoft has uncovered a flaw in all supported versions of Microsoft Windows that could allow hundreds of millions of computers to be taken over by a remote attacker, International Business Times reports.
Following last month’s leak of 13gb worth of private Snapchat videos, the vanishing message service has announced a new policy whereby it will automatically detect third-party apps, and advise users to disconnect them, reports Tech Crunch.
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
As we’ve reported before, users and businesses leaving their router username and passwords as the manufacturer’s default are potentially leaving themselves open to an easy hack, but a new website has sprung up illustrating the point in alarming detail.
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks — “air-gapped” networks — and exfiltrate sensitive files from them through removable drives.
A new wristband that aims to replace the password has launched a crowdfunding campaign on Kickstarter. At the time of writing, Everykey has passed the halfway mark on its $100,000 funding target with $56,586 pledged with 19 days to reach $100,000. Using Bluetooth, the Everykey promises “immediate access to a user’s password-protected electronics such as
Google has teamed up with the University of California in San Diego to publish surprising new research about phishing, how effective it is and how scammers work their phishing operations.
September’s breach of Home Depot that saw 56 million sets of credit and debit card data stolen was not the only thing lost in the leak, the company has revealed.
If you use Gmail as your ‘main’ email account – or rely on Google services such as Drive for work – it’s well worth revisiting Google’s Settings menus to give your Google security a boost.
Government requests for private Facebook data have increased by nearly 25% since the second half of 2013, the social networking giant has reported.
Echoing sentiments from across the Atlantic earlier in the year, the head of British spy agency GCHQ as made calls for crypto backdoors into phones to tackle crime, stating, “privacy has never been an absolute right.”
American Express has launched a new service, which looks to swap payment card numbers with unique tokens, reports Network World.
City University professor Dr David Stupples and a team of researchers are looking into ways of minimizing the risk of hacking planes in the future.
A special Parliamentary Select Committee has told peers in the United Kingdom’s House of Lords that there will be a global shortage of ” no less than two million cyber security professionals” by the year 2017, IT Pro Portal reports.