ESET discovers 'unique' self-protecting USB trojan

Malware magnifier

ESET has detected an undetectable malware. The security firm recently said to have discovered what it now calls Win32/PSW.Stealer.NAI, also known as the USB Thief.

The malware is designed to steal data and is, according to the firm, basically undetectable. It cannot be copied or reverse-engineered, making it extremely difficult to detect or analyze.

Continue reading

Weakening encryption severely affects our privacy

brown_paper_privacy

When Apple recently refused to comply with a federal court order issued by the FBI to help it break into an iPhone 5c, belonging to one of the shooters in the San Bernardino incident, a US House Judiciary Committee hearing was held.

If a ruling is made in favor of the FBI, Apple will have to weaken the encryption of its iPhone operating system, allowing the FBI to gain access to data on any iPhone. Apple’s chief executive, Tim Cook described this as the "software equivalent of cancer".

Continue reading

Instagram is taking advantage of Twitter's weakness

Instagram Twitter

A new report on the global state of social media confirms what everyone’s been talking about lately -- Twitter is struggling and Instagram is taking full advantage of it.

The report, entitled simply "Social", is the product of GlobalWebIndex, and it is a compilation of the latest trends in social networking.

Continue reading

Best practices for securing your website

pixel padlock

The web seems like a dangerous place lately, doesn’t it? We’re constantly hearing about some new piece of malware, or a website that was hacked and defaced, or a new vulnerability in what was once thought to be a secure protocol. I wouldn’t blame you for being paranoid -- after all, to hear the media tell it, your site’s under attack by criminals and ne’erdowells from all sides.

Here’s the thing -- if you’ve taken all the necessary steps to keep your site safe, you actually don’t have a whole lot to worry about. And that’s where we come in. Today, we’re going to talk about some best practices for securing your site, and protecting it against everything from infected clients to ignorant users. Let’s get started.

Continue reading

A different take on what DevOps is

Developer

For the last couple of years I’ve been struggling a bit with the idea of DevOps. At the root of it was my own lack of clarity about what it is. My question remained unanswered and it wasn’t for the want of trying.

I went to conferences, attended talks, read articles and met with people in our business. I gathered logically inconsistent lists of things that it was and wasn’t. In the end, I concluded that there isn’t a consensus, so I had to work out what DevOps means to me.

Continue reading

Tech industry sides with Apple in San Bernadino iPhone case

iPhone Passcode

The tech industry is on Apple’s side when it comes to the dispute with FBI over the unlocking of the San Bernardino shooter’s iPhone.

This was, once again, confirmed through a research done by security vendor AlienVault. According to the company’s survey, which polled 1,500 IT security professionals, 33 percent support FBI, while the rest think unlocking the phone will do nothing but weaken overall product security.

Continue reading

Losing customer trust is a major concern for DDoS targets

ddos_attack

The loss of trust and confidence of customers is the most damaging consequence of a DDoS (distributed denial of service) attack, a new survey by Corero Network Security says.

In the annual survey, entitled DDoS Impact Survey, losing trust is the most damaging consequence for 50 percent of those surveyed, followed by lost revenue, for 34 percent. The surveyed include IT decision makers (ITDMs), network operators and security experts that were present at the recently held RSA 2016 conference.

Continue reading

Uber announces bug bounty program

Google relaxes Project Zero bug disclosure policy after Microsoft complaints

Uber is calling on independent computer researchers and experts to find weaknesses in its system as the transportation firm is set to release its technical map.

As Uber jumps into the bug bounty bandwagon -- a philosophy that has long been advocated by the open-source software movement -- it details its software infrastructure to the public, identifies what sorts of data might be exposed inadvertently and suggests what types of flaws are the most likely to be found.

Continue reading

IT pros: Security budgets are not growing fast enough

Cloud money

As an answer to the ever increasing threats of cyber-attacks, the security budgets across various industries are growing, a new survey by The Institute of Information Security Professionals (IISP) suggests.

However, the rise in budgets is not enough to tackle the problem.

Continue reading

A Brexit would be 'hugely damaging' to UK's tech industry

Brexit EU European Union flag UK

If Britain were to leave the European Union, that would hurt its emerging tech sector, and hurt it badly. Those are the results of a new survey conducted by recruitment agency Talent Point.

Last year, the company registered 3,347 job seekers, with 24.73 percent coming from the EU, mostly thanks to the freedom of movement within it.

Continue reading

French media goes on the offense against ad-blockers

Access denied

French media is bringing the fight to ad blocking software. According to a report by The Guardian, a number of local outlets are preventing readers who run ad-blockers from accessing their content.

The sites, some of which are major media publications, are part of a trade association representing online businesses. They’re saying that by using ad blocking software, users are depriving the companies of valuable revenue sources, killing the business.

Continue reading

Keyless entry makes car theft easy

thief car door handle steal theft

Thieves can probably steal a bunch of cars with ease, if they are equipped with keyless entry. Those are the results of a new study done by a group of German car security researchers, looking into just how secure the technology is.

According to a news report by Wired, keyless entry for cars is not secure at all. As a matter of fact, out of 24 different cars, from 19 different manufacturers, all have been easily hacked through a method of amplifying the signal from the key fob in the house.

Continue reading

Demand for IT security pros is rising in UK

Security

The tech talent shortage the UK is faced with nowadays is no small problem, as the demand for IT security experts reaches new heights.

According to a new research by recruitment finance provider Sonovate, IT security professionals are currently the most wanted workers in the UK’s growing jobs market.

Continue reading

Some UK developers believe recruiters lack IT knowledge

Recruiter recruitment

The shortage of tech talent in the UK is not as straightforward as we thought -- it’s not just about the country not having enough actual people. The problem is also in the recruiters, a new and comprehensive study suggests.

The study was done by the Stack Overflow website for developers, and surveyed more than 56,000 people living in 173 countries. According to the survey, 73 percent of developers in the UK are either actively looking for new jobs, or are "open to new opportunities".

Continue reading

Microsoft extends support for Intel Skylake systems running Windows 7, Windows 8.1

businessman thumbs up ok

Microsoft has decided to reverse its position regarding support of Windows 7 and Windows 8.1 on systems using Intel’s Skylake platform.

In January, the company said that it would only guarantee full extended support for Skylake systems running Windows 7 and 8.1 until 17 July 2017. Microsoft now plans to offer full extended support for these systems for one more year, until 17 July 2018.

Continue reading

Load More Articles