LG G6 Release Date, Price and Specs – CNET

The LG G6 could not have come at a better time. Launching its spec-packed, metal-and-glass G6 at the world’s largest mobile show (Mobile World Congress) gives LG a rare opportunity to prove itself after that lukewarm reception of last year’s modular-like G5, without the fear of being overshadowed by its biggest competitor, Samsung.

The LG G6 could not have come at a better time. Launching its spec-packed, metal-and-glass G6 at the world’s largest mobile show (Mobile World Congress) gives LG a rare opportunity to prove itself after that lukewarm reception of last year’s modular-like G5, without the fear of being overshadowed by its biggest competitor, Samsung. (Samsung had to push back the launch of its Galaxy S8 flagship while dealing with fallout from its exploding Galaxy Note 7 fiasco.)

Continue reading “LG G6 Release Date, Price and Specs – CNET”

How Bad Was CloudBleed? 1.2 Million Leaks Bad

Google CloudFlare CloudBleed bug nightmare

The CloudBleed bug could have leaked secrets from major web companies, like Uber and OKCupid, Google researchers claim. (Image credit: Google).

Over the last few days, CloudFlare has been assessing the damage of the now-infamous CloudBleed bug that leaked memory from web servers across the internet.

Google CloudFlare CloudBleed bug nightmare

The CloudBleed bug could have leaked secrets from major web companies, like Uber and OKCupid, Google researchers claim. (Image credit: Google).

Continue reading “How Bad Was CloudBleed? 1.2 Million Leaks Bad”

Coachella Website Hack Could Lead To Phishing Attacks Against Users

Coachella is a pretty big deal. The two-weekend event will draw six-figure crowds and generate hundreds of millions of dollars in spending. This year’s festival kicks off in just a few more weeks.

Coachella is a pretty big deal. The two-weekend event will draw six-figure crowds and generate hundreds of millions of dollars in spending. This year’s festival kicks off in just a few more weeks… which makes the timing of the Coachella website getting hacked particularly dangerous.

Continue reading “Coachella Website Hack Could Lead To Phishing Attacks Against Users”

Breaking Baxter: 50 Bugs Show Robots Might Be Super Vulnerable To Cyberattack

Baxter and Swayer robots from Rethink Robotics

Rethink Robotics’ Baxter and Sawyer models. Researchers claim to have found numerous vulnerabilities across a wide range of robots.

Are the human gods creating our future robot overlords bestowing their creations with solid cybersecurity? A pair of hackers think not.

Baxter and Swayer robots from Rethink Robotics

Rethink Robotics’ Baxter and Sawyer models. Researchers claim to have found numerous vulnerabilities across a wide range of robots.

Continue reading “Breaking Baxter: 50 Bugs Show Robots Might Be Super Vulnerable To Cyberattack”

Cyber security need not cost a fortune, says researcher

Cyber security posture

Venables said the IT department of any organisation is a good place to start to get a basic understanding of its overall cyber security posture.

“The IT department should be able to provide details on controls, ports, services, firewall rules and device configurations – how these things are secured, how that is monitored, and how that could be changed to meet the most likely cyber threats to your organisation,” he said.

Cyber security posture

Venables said the IT department of any organisation is a good place to start to get a basic understanding of its overall cyber security posture.

Continue reading “Cyber security need not cost a fortune, says researcher”

Liberty begins legal proceedings in challenge to Snoopers’ Charter

Civil rights organisation Liberty has issued a legal challenge to the indiscriminate state surveillance powers in the Investigatory Powers Act, also known as the Snoopers’ Charter.

Download this free guide

Civil rights organisation Liberty has issued a legal challenge to the indiscriminate state surveillance powers in the Investigatory Powers Act, also known as the Snoopers’ Charter.

Continue reading “Liberty begins legal proceedings in challenge to Snoopers’ Charter”

Ransomware Is A Repeat Offender: How To Protect Your Business

If there is one major cybersecurity lesson we learned last year it was this: Ransomware is here, and it isn’t going away anytime soon.

Ransomware is a type of malware that severely restricts access to a computer, mobile device, or file until the demanded fee is paid by the victim.

If there is one major cybersecurity lesson we learned last year it was this: Ransomware is here, and it isn’t going away anytime soon.

Continue reading “Ransomware Is A Repeat Offender: How To Protect Your Business”

Just How Secure Are Those Encrypted Apps Leaking Trump’s Secrets?

Graffiti urging people to use Signal, an encrypted messaging app, is spray-painted on a wall during a protest on February 1, 2017 in Berkeley, California. (Photo by Elijah Nouvelage/Getty Images)

Graffiti urging people to use Signal, an encrypted messaging app, is spray-painted on a wall during a protest on February 1, 2017 in Berkeley, California. (Photo by Elijah Nouvelage/Getty Images)

Continue reading “Just How Secure Are Those Encrypted Apps Leaking Trump’s Secrets?”

The Latest Privacy Nightmare For Parents: Data Leaks From Smart Toys

A week ago, the German government banned the Internet-connected My Friend Cayla doll over concerns that hackers could use them to spy on children. It turns out that connected toys don’t even need to be hacked to cause a privacy nightmare.

A week ago, the German government banned the Internet-connected My Friend Cayla doll over concerns that hackers could use them to spy on children. It turns out that connected toys don’t even need to be hacked to cause a privacy nightmare. All it takes is an improperly-configured database.

Continue reading “The Latest Privacy Nightmare For Parents: Data Leaks From Smart Toys”

“Gamaredon” Group Uses Custom Malware in Ukraine Attacks

A Russia-linked threat group tracked as “Gamaredon” has been using custom-developed malware in attacks aimed at Ukraine, Palo Alto Networks reported on Monday.

The group has been active since at least mid-2013, but its activities were first detailed in April 2015 by LookingGlass.

A Russia-linked threat group tracked as “Gamaredon” has been using custom-developed malware in attacks aimed at Ukraine, Palo Alto Networks reported on Monday.

Continue reading ““Gamaredon” Group Uses Custom Malware in Ukraine Attacks”