Tag Archives: Security

6 Free Ransomware Decryption Tools

Source: 6 Free Ransomware Decryption Tools

Posted in Emergent Topics | Tagged , | Leave a comment

7 Wi-Fi vulnerabilities beyond weak passwords | Computerworld

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways. Source: 7 Wi-Fi vulnerabilities beyond weak passwords | Computerworld

Posted in Emergent Topics | Tagged , , , | Leave a comment

Google Cloud adds new customer-supplied encryption key partners | ZDNet

After encrypting data at the storage level for many years, Google is working on giving customers more choices for securing their information. Source: Google Cloud adds new customer-supplied encryption key partners | ZDNet

Posted in Emergent Topics | Tagged , , | Leave a comment

The essential guide to anti-malware tools | CSO Online

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs. Source: The essential guide to anti-malware tools | CSO Online

Posted in Emergent Topics | Tagged , | Leave a comment

How to wake the enterprise from IoT security nightmares | CSO Online

Solutions present and future for IoT security scares that keep you up at night. Source: How to wake the enterprise from IoT security nightmares | CSO Online

Posted in Emergent Topics | Tagged , , | Leave a comment

7 (more) security TED Talks you can’t miss | CSO Online

In this selection you’ll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to Bruce … Continue reading

Posted in Emergent Topics | Tagged , , , | Leave a comment

10 biggest hacks of user data in 2016 | Network World

You take great pains to come up with a strong password when registering for an account on a website — only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user … Continue reading

Posted in Emergent Topics | Tagged , , , | Leave a comment

Zcash – All coins are created equal.

Source: Zcash – All coins are created equal.

Posted in Emergent Topics | Tagged , , , | Leave a comment

Mingis on Tech: Google goes big on hardware | Computerworld

With the Google Pixel smartphone, Google Home and Google Wifi, it looks as though someone’s trying to build a well-rounded tech ecosystem. Executive News Editor Ken Mingis and Multimedia Editor Keith Shaw weigh the pros and cons. Source: Mingis on … Continue reading

Posted in Emergent Topics | Tagged , , , | Leave a comment

Chip card lawsuit to move forward against Visa, Mastercard, others | Computerworld

A federal judge has ruled it is plausible that four national credit-card companies improperly conspired “in lockstep” to set a deadline of Oct. 1, 2015 for requiring retailers to upgrade their technology to accept embedded chip cards for credit and … Continue reading

Posted in Emergent Topics | Tagged , , | Leave a comment

The FBI could have saved money with this iPhone 5c hack | Computerworld

The FBI may have paid a small fortune to unlock an iPhone 5c used by the San Bernardino shooter. But a security researcher has demonstrated a way to do it for less than $100. Source: The FBI could have saved … Continue reading

Posted in Emergent Topics | Tagged , , , | Leave a comment

Here’s how secret voice commands in YouTube videos could hijack your smartphone | PCWorld

A muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it. Source: Here’s how secret voice commands in YouTube videos could hijack your smartphone | PCWorld Also consider researchers found … Continue reading

Posted in Emergent Topics | Tagged , | Leave a comment

U.S. gets warnings and advice about the Internet of Things | Computerworld

Posted in Emergent Topics | Tagged , , , | Leave a comment

Hackers offering bulk discount to unlock encrypted MedStar data – Baltimore Sun

The hackers who locked up data on MedStar’s computers this week are demanding ransom to begin unlocking it — and they’re offering a bulk discount to release all of it, according to a copy of the demands obtained by The … Continue reading

Posted in Emergent Topics | Tagged , , | Leave a comment

Apple Vs. FBI: 4 Key Developments This Week – InformationWeek

The legal battle between Apple and the US government made significant headway this week. These are the four key takeaways from this past week. Source: Apple Vs. FBI: 4 Key Developments This Week – InformationWeek

Posted in Emergent Topics | Tagged , , , , | Leave a comment

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats | Computerworld

Security researchers launched cyberattacks against a teleoperated surgical robot; they easily hijacked the Raven II robot during surgery and launched a denial-of-service attack that stopped the robot and made it impossible for a surgeon to remotely operate. Source: Researchers hijack … Continue reading

Posted in Emergent Topics | Tagged , , | Leave a comment

Google Online Security Blog: CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow

Source: Google Online Security Blog: CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow

Posted in Emergent Topics | Tagged , , | Leave a comment

Apple vs. the FBI: The legal arguments explained | Computerworld

Posted in Emergent Topics | Tagged , , , , | Leave a comment

Apple faces at least 12 other All Writs Act orders to force it to unlock more iPhones | Computerworld

Posted in Emergent Topics | Tagged , | Leave a comment

Cybercrime And Hacking Atlas

A geographic guide with cybercrime threat and target trends in 10 notable countries. Source: Cybercrime And Hacking Atlas

Posted in Emergent Topics | Tagged , | Leave a comment