UN Creates Privacy Watchdog to Go After Government Surveillance Programs
An expert will be tasked with investigating the privacy implications of member countries’ cyber-spying programs.
Twitch Botnets-for-Hire Inflate Video Views
Attackers have been compromising users’ computers to add them to botnets, which are rented out to artificially inflate Twitch channel audience numbers.
Retail, Financial Sectors Team Up on Formal Info-Sharing
They have created an intelligence-sharing portal that will link the two industries’ key players.
RSA Bans Booth Babes
No more miniskirts on show at US security conference
PayPal Coughs Up $7.6 Million After Processing Payments to WMD Suspects
Payments giant took years to implement long-term solution, says US Treasury
Coder Cons Tinder Men Into Chatting With Each Other
Swipe left or right?
Sextortion Apps for Android, Just for Criminals
Trend Micro has found four malicious apps, which criminals can use to siphon their victims’ online passwords and contacts in order to give them more leverage with victims.
Guest Wi-Fi Flaw Endangers Devices, Full Hotel Networks
Attackers can take full control of a device and even access the hotel's guest management system with a simple exploit.
One in Every 3 Top Websites Is Compromised and Dangerous
One-third of the most-trafficked websites are serving malware, spam or botnets. And more than one in five (21%) is running software with known vulnerabilities.
Software Flaws Jump 20% in 2014 as Zero Days Soar – Report
Tough times for IT teams tasked with patching
Israeli Researchers Jump the Air Gap with BitWhisper
New technique could compromise maximum security computers
F-Secure Router Checker Scans for Malicious DNS Activity
One-click tool can tell you if hackers have been redirecting your traffic