
RECENT ARTICLES

Bluetooth exploit can track and identify iOS, Microsoft mobile device users
A flaw in the Bluetooth communication protocol may expose modern device users to tracking and could leak their ID, researchers claim. The vulnerability can be used to spy on users despite native OS protections that are in place and impacts Bluetooth devices on Windows 10, iOS, and macOS machines. This includes iPhones, iPads, Apple Watch models, MacBooks, and Microsoft tablets & laptops. Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. On Wednesday, researchers from Boston University David Starobinski and...…A flaw in the Bluetooth communication protocol may expose modern device users to tracking and could leak their ID, researchers claim. The vulnerability can be used to spy on users despite native OS protections that are in place and impacts Bluetooth devices on Windows 10, iOS, and macOS machines. This includes iPhones, iPads, Apple Watch models, MacBooks, and Microsoft tablets & laptops. Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. On Wednesday, researchers from Boston University David Starobinski and...WW…

SIM swap horror story: I've lost decades of data and Google won't lift a finger
At 11:30 pm on Monday, 10 June, my oldest daughter shook my shoulder to wake me up from a deep sleep. She said that it appeared my Twitter account had been hacked. It turns out that things were much worse than that. Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.After rolling out of bed, I picked up my Apple iPhone XS and saw a text message that read, "T-Mobile alert: The SIM card for xxx-xxx-xxxx has been changed. If this change is not authorized, call 611." Well, seeing as how T-Mobile took away my...…At 11:30 pm on Monday, 10 June, my oldest daughter shook my shoulder to wake me up from a deep sleep. She said that it appeared my Twitter account had been hacked. It turns out that things were much worse than that. Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.After rolling out of bed, I picked up my Apple iPhone XS and saw a text message that read, "T-Mobile alert: The SIM card for xxx-xxx-xxxx has been changed. If this change is not authorized, call 611." Well, seeing as how T-Mobile took away my...WW…

Programming languages: Rust enters top 20 popularity rankings for the first time | ZDNet
By| June 2, 2020 -- 12:05 GMT (05:05 PDT)| Topic:Developer: Pain-solving Rust is the most-loved programming language1:09Programming language Rust has entered the top 20 of the Tiobe popularity index for the first time, but it's still five spots behind systems programming rival Go. There's growing interest in the use of memory-safe Rust for systems programming to build major platforms, in particular at Microsoft, . Amazon Web Services is also using Rust for performance-sensitive components in Lambda, EC2, and S3. Rust has seen its ranking rise considerably on Tiobe, from 38 last year to 20...…By| June 2, 2020 -- 12:05 GMT (05:05 PDT)| Topic:Developer: Pain-solving Rust is the most-loved programming language1:09Programming language Rust has entered the top 20 of the Tiobe popularity index for the first time, but it's still five spots behind systems programming rival Go. There's growing interest in the use of memory-safe Rust for systems programming to build major platforms, in particular at Microsoft, . Amazon Web Services is also using Rust for performance-sensitive components in Lambda, EC2, and S3. Rust has seen its ranking rise considerably on Tiobe, from 38 last year to 20...WW…

Email is biggest security risk, old devices aren't getting patched, and local cyber 'incidents' | ZDNet
By| June 10, 2020 -- 06:20 GMT (23:20 PDT)| Topic:Email continues to be the most popular attack vector, with a report from Mimecast noting that just over half of those it monitors have experienced a ransomware attack in the past 12 months. In the State of Email Security 2020 , Mimecast summarised the results of a global survey of 1,025 IT decision makers along with the information it gathered from screening more than 1 billion emails a day. It said 51% have been impacted by ransomware in the past 12 months, 31% have experienced data loss due to lack of cyber resilience preparedness, 60%...…By| June 10, 2020 -- 06:20 GMT (23:20 PDT)| Topic:Email continues to be the most popular attack vector, with a report from Mimecast noting that just over half of those it monitors have experienced a ransomware attack in the past 12 months. In the State of Email Security 2020 , Mimecast summarised the results of a global survey of 1,025 IT decision makers along with the information it gathered from screening more than 1 billion emails a day. It said 51% have been impacted by ransomware in the past 12 months, 31% have experienced data loss due to lack of cyber resilience preparedness, 60%...WW…

Principled Technologies releases first true cloud performance benchmarks | ZDNet
Byfor| June 26, 2020 -- 14:15 GMT (07:15 PDT)| Topic:Microsoft reports a 775% increase in demand for cloud servicesWe all use the cloud, but measuring cloud performance is difficult. I should know. I've written benchmarks, and I using and other programs, which, frankly, weren't ideal for testing clouds. But now and the have released the, a free benchmark, which seeks to accurately measure Infrastructure as a Service (IaaS) cloud performance. The beta CloudXPRT program includes web microservices and data analytics workloads. Testers can use metrics from both workloads to compare IaaS stack...…Byfor| June 26, 2020 -- 14:15 GMT (07:15 PDT)| Topic:Microsoft reports a 775% increase in demand for cloud servicesWe all use the cloud, but measuring cloud performance is difficult. I should know. I've written benchmarks, and I using and other programs, which, frankly, weren't ideal for testing clouds. But now and the have released the, a free benchmark, which seeks to accurately measure Infrastructure as a Service (IaaS) cloud performance. The beta CloudXPRT program includes web microservices and data analytics workloads. Testers can use metrics from both workloads to compare IaaS stack...WW…

New Apple macOS Big Sur feature to hamper adware operations | ZDNet
Byfor| July 3, 2020 -- 15:25 GMT (08:25 PDT)| Topic:Cyber attacks and malware are one of the biggest threats on the internet. Learn about the different types of malware - and how to avoid falling victim to attacks.With macOS 11, also known as Big Sur, Apple has removed the ability to install macOS profile configurations from the command-line.This ability was previously a core feature of macOS' enterprise package, which allows system administrators to deploy new configurations company-wide via automated scripts.However, the ability to deploy a new profile config via the command-line has also...…Byfor| July 3, 2020 -- 15:25 GMT (08:25 PDT)| Topic:Cyber attacks and malware are one of the biggest threats on the internet. Learn about the different types of malware - and how to avoid falling victim to attacks.With macOS 11, also known as Big Sur, Apple has removed the ability to install macOS profile configurations from the command-line.This ability was previously a core feature of macOS' enterprise package, which allows system administrators to deploy new configurations company-wide via automated scripts.However, the ability to deploy a new profile config via the command-line has also...WW…

US charges five hackers part of Chinese state-sponsored group APT41 | ZDNet
Byfor| September 16, 2020 -- 15:03 GMT (08:03 PDT)| Topic:The US government has filed charges today against five Chinese nationals for hacking into more than 100 companies across the world, part of a state-sponsored hacking group known as APT41.According to court documents unsealed today, US officials said the group has hacked software development companies, computer hardware manufacturers, , social media companies, , , non-profit organizations, , think tanks, from where they stole proprietary source code, code-signing certificates, customer data, and valuable business information. Victim...…Byfor| September 16, 2020 -- 15:03 GMT (08:03 PDT)| Topic:The US government has filed charges today against five Chinese nationals for hacking into more than 100 companies across the world, part of a state-sponsored hacking group known as APT41.According to court documents unsealed today, US officials said the group has hacked software development companies, computer hardware manufacturers, , social media companies, , , non-profit organizations, , think tanks, from where they stole proprietary source code, code-signing certificates, customer data, and valuable business information. Victim...WW…

Report: CIA most likely behind APT34 and FSB hacks and data dumps | ZDNet
Byfor| July 15, 2020 -- 13:07 GMT (06:07 PDT)| Topic:Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.US President Donald Trump gave broad powers to the Central Intelligence Agency (CIA) in 2018 to carry out offensive cyber operations across the globe.In an exclusive today, that the agency used its newly acquired powers to orchestrate "at least a dozen operations" across the world.The CIA was already authorized to conduct silent surveillance and data...…Byfor| July 15, 2020 -- 13:07 GMT (06:07 PDT)| Topic:Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.US President Donald Trump gave broad powers to the Central Intelligence Agency (CIA) in 2018 to carry out offensive cyber operations across the globe.In an exclusive today, that the agency used its newly acquired powers to orchestrate "at least a dozen operations" across the world.The CIA was already authorized to conduct silent surveillance and data...WW…

Google launches Chrome extension for ad transparency, Trust Token API | ZDNet
By| August 2, 2020 -- 22:43 GMT (15:43 PDT)| Topic:Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.Google has launched this week a Chrome extension that shows how many ads are being loaded on any given web page, what advertisers or ad tech companies are present on the page, and what user data has been used to show personalized ads. The extension, named , is available on the official Chrome Web Store. Google said it released the extension to make it easier for users to understand how ads are being shown. The...…By| August 2, 2020 -- 22:43 GMT (15:43 PDT)| Topic:Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.Google has launched this week a Chrome extension that shows how many ads are being loaded on any given web page, what advertisers or ad tech companies are present on the page, and what user data has been used to show personalized ads. The extension, named , is available on the official Chrome Web Store. Google said it released the extension to make it easier for users to understand how ads are being shown. The...WW…

More than half of Twitter's ‘Reopen America’ calls from bots, study finds | ZDNet
Byfor| June 1, 2020 -- 11:00 GMT (04:00 PDT)| Topic:In a now-familiar truth, scenario, malicious actors are creating bots to sow discontent and division. That's according to a new study out of , which found that half of all Twitter calls to reopen the country may be from bots. It adds a new chapter to the misinformation that helped stoke ire during the 2016 elections and led to awareness of the role of social media as arbiter of perceived truth and ultimately political power. Since January, CMU researchers have collected 200 million tweets touching on the coronavirus. A whopping 82% of the...…Byfor| June 1, 2020 -- 11:00 GMT (04:00 PDT)| Topic:In a now-familiar truth, scenario, malicious actors are creating bots to sow discontent and division. That's according to a new study out of , which found that half of all Twitter calls to reopen the country may be from bots. It adds a new chapter to the misinformation that helped stoke ire during the 2016 elections and led to awareness of the role of social media as arbiter of perceived truth and ultimately political power. Since January, CMU researchers have collected 200 million tweets touching on the coronavirus. A whopping 82% of the...WW…

Jason Cipriani

Zack Whittaker

Matthew Miller

Charlie Osborne

Catalin Cimpanu

Jason Perlow

Tom Foremski

Danny Palmer

Steven J. Vaughan-Nichols

Chris Duckett

Liam Tung

Steven J. Vaughan-Nichols
