Category: Security

More adventures in replying to spam – James Veitch

James Veitch has spent years doing the tireless, thankless work of replying to spam emailers so you don't have to. He returns to TED to tell the tale of yet another spam email adventure, this time with a vital lesson attached: How to annoy your way off any spammer's mailing list.

This is what happens when you reply to spam email – James Veitch

Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, months-long exchange with a spammer who offered to ...

Report reviews risk incident trends

Fraud, cyber, and security incidents are now the ''new normal'' for companies across the world, according to the executives surveyed for the 2016/17 Kroll Annual Global Fraud and Risk Report. The proportion of executives that reported their companies fell victim to fraud in the past year rose significantly to 82 percent, from 75 percent in ...

ATM Malware Retooled to Strike More Machines

Upgraded Ploutus-D Malware Designed to Drain ATMs From Any Manufacturer In early 2013, cybercriminals began deploying in Mexico what some security experts described as one of the most advanced pieces of malware that's ever been built to steal money from ATMs. Nicknamed Ploutus, it evolved to become the first ATM malware that could be controlled ...

Researchers reconstruct fingerprint data from digital photo

Researchers in Japan have been able to "copy" fingerprint data from a digital photo of a person holding up a peace sign. This research is surely going to raise questions over the potential theft of fingerprint data through photos. Currently, many smartphones, laptops, and tablets feature some sort of biometric finger scanner that allows the ...

Everyone is falling for this frighteningly effective Gmail scam

Security researchers have identified a "highly effective" phishing scam that's been fooling Google Gmail customers into divulging their login credentials. The scheme, which has been gaining popularity in the past few months and has reportedly been hitting other email services, involves a clever trick that can be difficult to detect. Researchers at WordFence, a team ...

How the Internet of Things will change our lives

The Internet of Things (IoT) has the power to change our world. And while we are starting to see its incredible impact, we are still very much at the beginning of the transformational journey. Here's a look into the current state of affairs in the race to standardize IoT, along with what people are saying ...

Are we safe in the Internet of Things?

Suppose a criminal were using your nanny cam to keep an eye on your house. Or your refrigerator sent out spam e-mails on your behalf to people you don’t even know. Now imagine someone hacked into your toaster and got access to your entire network. As smart products proliferate with the Internet of Things, so ...

Edward Snowden on passwords: Last Week Tonight with John Oliver (HBO)

Really important advises from Edward Snowden especially in these times of massive cyber attacks.

Do you know what you agree to when you download an app on your smartphone?

Some of the most popular apps on your smartphone ask for permissions that expose data to outside sources.

%d bloggers like this: