Karl Thomas

Independent Correspondent



148 articles by Karl Thomas

Samsung Pay 'safe' from LoopPay attack

Samsung Pay 'safe' from LoopPay attack

Samsung Pay 'safe' from LoopPay attack

Samsung denies that Samsung Pay has been affected by an attack on LoopPay, a startup that it recently acquired to develop its mobile payment system.

Karl Thomas08 Oct 20151 min. read


Global cost of cybercrime ‘continues to rise’

Global cost of cybercrime ‘continues to rise’

Global cost of cybercrime ‘continues to rise’

A new report from the Ponemon Institute reveals that the global cost of cybercrime to businesses shows no signs of slowing down.

Karl Thomas07 Oct 20151 min. read


New YiSpecter malware attacks iOS devices without jailbreak

New YiSpecter malware attacks iOS devices without jailbreak

New YiSpecter malware attacks iOS devices without jailbreak

A new malware identified as YiSpecter attacks iOS devices with and without jailbreak, researchers from Palo Alto Networks have revealed. ESET has detected this malware as a trojan with both variants iOS/YiSpecter.A and iOS/YiSpecter.B.

Karl Thomas06 Oct 20151 min. read


Cybercrime

Cybercrime ‘more threatening than ever’

Cybercrime ‘more threatening than ever’

Cybercrime

Cybercrime ‘more threatening than ever’

Cybercrime is more aggressive and confrontational than it has ever been, Europol's latest Internet Organised Crime Threat Assessment (IOCTA) has stated.

Karl Thomas05 Oct 20153 min. read


Experian experiences T-Mobile data breach

Experian experiences T-Mobile data breach

Experian experiences T-Mobile data breach

Experian has revealed that information belonging to T-Mobile, which was housed on one of its servers, has been accessed by cybercriminals in a data breach.

Karl Thomas02 Oct 20151 min. read


Significant WinRAR vulnerability identified

Significant WinRAR vulnerability identified

Significant WinRAR vulnerability identified

An expert says that the popular compression tool WinRAR contains a significant vulnerability that exposes it to an attack.

Karl Thomas30 Sep 20151 min. read


Virtual skyscraper Cyphinx hopes to find cyber talent

Virtual skyscraper Cyphinx hopes to find cyber talent

Virtual skyscraper Cyphinx hopes to find cyber talent

A 3D skyscraper has been developed to help the Cyber Security Challenge find the next generation of cyber talent.

Karl Thomas30 Sep 20152 min. read


Kids Online

UK parents ‘want minimum age for smartphone ownership’

UK parents ‘want minimum age for smartphone ownership’

Kids Online

UK parents ‘want minimum age for smartphone ownership’

A survey has found that most parents in the UK are keen to see a minimum age introduced for smartphone ownership.

Karl Thomas30 Sep 20151 min. read


Vulnerable medical equipment details disclosed online

Vulnerable medical equipment details disclosed online

Vulnerable medical equipment details disclosed online

Vulnerable hospital equipment details can be found online, two security researchers have found.

Karl Thomas29 Sep 20151 min. read