#ISC2Congress: How to Mitigate Evolving Insider Threats

#ISC2Congress: How to Mitigate Evolving Insider Threats The changing nature of insider threats was described by Lisa Forte, founder, Red Goat Cyber Security, during a keynote presentation at this week’s virtual ISC2…

Google Crushes YouTube Cookie-Stealing Channel Hijackers

Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels.  Google has caught and brushed off…

A China-aligned espionage group is targeting global telecoms, sweeping up call data dating back years

Written by AJ Vicens Oct 19, 2021 | CYBERSCOOP An advanced network of digital spies with a nexus to Chinese interests has successfully compromised parts of the global telecommunications network,…

Robots for kids: Best STEM kits and other tech gifts for hackers of all ages

All the signs were there. If my parents knew then what parents know now, they would have been prepared. But back in the 1960s and 1970s, the maker movement was…

Staggering growth of cybercrime and how data science helps improve online security

Did you know if you were to compare the money generated by cybercrime with the GDP of world nations, it would come third behind the economic powerhouses of America and…

Windows security: 20 years on from Bill Gates' Trustworthy Computing memo, how much has changed?

It’s almost 20 years since then-Microsoft boss Bill Gates wrote his famous Trustworthy Computing memo, in which he urged the company to produce more secure software.  “Eventually, our software should…

Singapore to develop mobile defence systems with Ghost Robotics

Singapore’s Defence Science and Technology Agency (DSTA) has inked a partnership with Philadelphia-based Ghost Robotics to identify uses cases involving legged robots for security, defence, and humanitarian applications. They will…

Olympus Cyberattack Happening During the Weekend

Cyberattacks seem to have no end. A new one targeted Olympus, a firm that specializes in medical technology, over the weekend, on Sunday, October 10. Following this Olympus cyberattack, the…

Android Phones Sharing Significant User Data Without Opt-Outs

Android Phones Sharing Significant User Data Without Opt-Outs Android mobile phones are undertaking significant data sharing without offering opt-outs for users, according to a new report by researchers at Trinity College Dublin…

ECU Student Charged with Cyber-stalking

ECU Student Charged with Cyber-stalking A student at East Carolina University has been charged with cyber-stalking after allegedly posing as a member of a rival fraternity to upload a racist…