search
 
 
LATEST POSTS
EDITOR'S PICKS
 

Graph: Most Cyber Attacks Originate in China

BY Keane J.

Most cyber-attacks originate in China according to a new State of the Internet report from Akamai. More than 43 percent of attacks were noted from China in the sample of attacks that were surveyed. The one flaw however in the research was that the origin of an attack was traced using IP addresses and this…

Continue Reading

Facebook Changes Its Security Settings For Better or Worse

BY James Cummings

For many years, Facebook users have been plagued with a lack of understanding on how their social media platform really works. It is only a small percentage of users that actually take the time to thoroughly analyze every single aspect of Facebook. After all, someone that is a member for the purpose of posting statuses…

Continue Reading

Brazil Passes New Internet Privacy Bill

BY Keane J.

Brazil has passed new legislation that guarantees people equal access to the Internet and bolsters privacy protection. Brazilian president Dilma Rousseff will sign the legislation into law at this year’s Net Mundial conference taking place this week in Brazil. Rousseff was previously a victim of NSA snooping and has been a strong advocate of Internet…

Continue Reading

 
 
New Attach-ception Style Malware Found in the Wild
BY Chris Stobing

This week, TrendMicro posted a blog which claimed they had stumbled across a new breed of malware distribution which attempts to duck standard scanning services by burying their program two layers deep. Instead of creating fake attachments that contain malware on their own, this new variant on the old attack vector decides to go one…

Continue Reading

Anonymous Launches Attacks on Israeli Sites
BY Keane J.

Anonymous are back at it again with #OpIsrael, a widespread attack on Israeli websites. The hacks were carried out throughout Monday and leaked information from different sites, including stealing passwords from Toyota’s Israeli site. The mysterious hacktivist outfit have spoken before in favor of Palestine. The group posted the passwords and other information in notices…

Continue Reading

Hackers Could Unlock Your Tesla Car
BY Keane J.

The Tesla Model S car needs more reinforced security technology or else it will be exploited. That’s according to Nitesh Dhanjani, a security consultant and author, that has drawn attention to flaws in the system that could allow a hacker to remotely locate the car and unlock the doors. While the attacker would not be…

Continue Reading

 
ARCHIVE