Category: IT Management

Please stop charging your phone in public ports!

If a port is compromised, there's no limit to what information a hacker could steal from you!

A guided tour of the cybercrime underground

One of the strange features of cybercrime is how much of it is public. A quick search will turn up forums and sites where stolen goods, credit cards and data are openly traded. But a glance into those places may not give you much idea about what is going on. "Everyone can join as long ...

Travelers fall victim to fake Airbnb site

When Anne Bradbury, an experienced Airbnb user, found what looked like the perfect flat to rent for a weekend away in Amsterdam, she emailed her friends, who quickly agreed it looked great. After checking the reviews, and making sure the reviewers were legitimate – as she had done several times before – and then making several ...

Taking auditing to new level with International Standard under revision

ISO’s popular standard for auditing management systems is under revision and has just reached the first voting stage, a crucial step in its development. Organizations are increasingly turning to management systems, in a quest to be more effective and save time and money. Many companies have several different management systems, each focusing on different areas, ...

Everything you need to know about Cloudbleed, the latest internet security disaster

The internet infrastructure company Cloudflare, which provides a variety of performance and security services to millions of websites, revealed late Thursday that a bug had caused it to randomly leak potentially sensitive customer data across the internet. The flaw was first uncovered by Google vulnerability researcher Tavis Ormandy on February 17, but could have been ...

Google’s new tool will tell you if you are being an online troll

Google's parent company has handed developers an anti-trolling tool. Jigsaw, an incubator and think tank that sits inside Alphabet (Google's umbrella company), has released an API called Perspective, which uses machine learning to measure whether an online comment counts as harassment or abuse, as reported by Wired. It's already being tested by Wikipedia, the Guardian, ...

Passengers happier with Uber & Grab than cabs

Private-hire services fare better than taxis in customer satisfaction survey Passengers are more satisfied with private-hire car services than taxis, according to a Public Transport Council (PTC) survey. The poll, conducted in August, found that private-hire services such as Uber and Grab were given a satisfaction mean score of 7.9 out of 10, while taxis ...

Germany bans internet-connected dolls over fears hackers could target children

Germany has banned a popular talking doll that can connect to the internet over fears its technology could be exploited by hackers to target children. The German telecommunications watchdog advised parents who have already bought the popular Cayla dolls to destroy them, but stopped short of ordering them to do so. The Cayla doll, which ...

Report: Most cyber-attacks come from same place, and use basic tactics

F-Secure's new cyber security report paints a stark picture of the threats posed by insecure networks and devices, the internet of things, cyber-crime and others. F-Secure has released a new report which explores the trends and threats defining the current state of cyber-security across the globe. According to the report, a majority of active reconnaissance ...

80% of businesses hit by certificate-related outages

A new study has found that inadequate cryptographic controls significantly impact reliability and availability of critical services. The study, released on Thursday by Venafi, a provider of protection for cryptographic keys and digital certificates, examined the scale, frequency and causes of certificate-related outages and determined that certificate-related outages negatively impact the reliability and availability of ...

Ransomware evolution: Locky and Sage combine in phishing

The ransomware marketplace is far from dissipating. New variants have already appeared in 2017 and researchers have detected that one new iteration, Sage, shares infrastructure with another already notorious malware, Locky, according to a PhishMe blog post. In digging into samples of Sage, the PhishMe researchers found that while the coders behind the ransomware at ...

Australian government issues Valentine’s Day scam alert

Social media, and particularly Facebook, are very popular with scammers seeking to contact targets. Love may be in the air on February 14 but Saint Valentine's Day is also peak time for scamming lonely hearts for money, an Australian government body warned on Monday. Romance scams cost victims more money than any other form of ...