- Russian hackers pose a threat to UK elections, GCHQ warns
An emergency summit has been called to discuss how far Russia cyberattacks could influence coming elections.
- CIA WikiDump re-enforces old security mantras
Despite the efforts of the Assange publicity machine, it's business as usual on the security front, even if the CIA is up to no good.
- Why the Bitly link-shortening service went down for some users
Comcast users were unable use Bitly link shortening services for several hours because Comcast blocked its addresses out of security concerns.
- Google briefly pulls Nexus 6 March security update
Having issues using Android Pay on your Nexus 6 after the latest update? You're not alone.
- SecuritySpy: A quick fix for orphaned Logitech Alert owners
What happens when the hardware you have still works, but the software has gone to the great bit bucket in the sky? In the case of Logitech Alert owners, they move to a better replacement product. Here …
- UN privacy watchdog says 'little or no evidence' that mass surveillance works
The laws are "predicated on the psychology of fear," which prevents the public from "objectively assessing the effectiveness" of privacy-busting measures, said the UN special rappo …
- Now Google's clever AI can tell you're not a bot without reCAPTCHA even appearing
You'll no longer need to confirm "I'm not a robot" with the latest version of Google's reCAPTCHA bot filter test.
- Ransomware: What would you do? One in three infected organisations pay hackers to get data back
Pay up, lose your data or try to recover the files yourself?
- NBN facing challenges from mobile and IoT: Cisco
While NBN is no longer 'behind the eight-ball', it is facing challenges from the connectivity speeds and ubiquitousness of mobile networks, as well as the question of how it will accommodate …
- Australian government has no issue with agencies demanding telco data outside metadata laws
The Attorney-General's Department does not consider agencies using their own statutes to demand data from telcos as a loophole.
- This USB firewall protects against malicious device attacks
This pocket-sized firewall is a nifty tool for the privacy-minded and super paranoid that aims to protect against USB-based attacks.
- Google Cloud unveils its custom security chip, new security features
Its innovations in security should not only allay concerns but encourage cloud migration, Google says at the Google Next conference.
- Sift Science releases account takeover prevention tool
As we move more of our lives online, fraudsters are using account takeover attacks, which allows them to access richer information and cause more damage.
- After CIA leaks, tech giants scramble to patch security flaws
Apple, Microsoft, and Google are analyzing leaked CIA documents to see if their products are affected, but security researchers say that most of the flaws have long been fixed.
- WikiLeaks: We will work with tech companies to fix CIA hacking holes
Tech companies will be offered additional technical details to help fix flaws, said Julian Assange.
- Sneaky adware exploits Android users with precision targeting
Skinner Adware went undiscovered for two months, thanks to subtle tactics which saw it base adverts on which apps 10,000 infected victims were using at that time.
- Could new cloud service ease compliance headaches?
iland says new framework could help companies stay on top of the intricacies of maintaining privacy, security, and compliance.
- FBI, CIA launch investigation into WikiLeaks file dump
The US agencies say the release of CIA documents to the public should be considered "deeply troubling."
- Google says Chrome, Android already shielded from 'many' CIA exploits
Google reassures Chrome and Android users that CIA's hacking tools don't affect them.