Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

The Upload: Your tech news briefing for Monday, Aug. 3

Robot hitchiker attacked, abandoned... Nokia sells Here mapping business to German car makers... Spy-spotting software comes to Wall St

00 title

injection

T-Mobile caught in crossfire of injected ad war with Flash Networks

T-Mobile, Citizens Bank, thousands of other innocent companies and millions of users are stuck between shady ad networks and Google, publishers, and legitimate advertisers

sorriest tech companies 2015 1

Sorriest technology companies of 2015

A rundown of the year in apologies from tech vendors and those whose businesses rely heavily on tech.

Airbnb guest suspected of stealing $35k from San Francisco home

Incident highlights risks of renting out homes through online sites

DNS server attacks begin using BIND software flaw

Analysts predicted attackers would quickly figure out how to take advantage of the flaw

Fake Apple iOS crash reports prove tricky to remove

The fake message advertises a phone number for a technical support scheme

Windows 10 email delivers CTB-Locker ransomware

Microsoft will NOT email you Windows 10, it's ransomware

For people who are impatient for their Windows 10 upgrade, don't fall for an email scam that includes a zipped file that is supposedly Windows 10. It's not, but it will install ransomware on your computer. For those of you waiting on...

patient records

Personal health information in the wrong hands can be painful

Personal Health Information is much more detailed, and much more permanent, than credit card data. That's one of the reasons it is so attractive to cyber criminals. The other reason is that it is relatively easy to get.

Former Hacking Team developer reportedly in contact with a terrorist group

Disgruntled employees deny planning to sell an antidote to the company's surveillance software

Italian police shutter Dark Web marketplace

Italian police have shut down a Dark Web marketplace offering illegal goods ranging from child pornography to forged luncheon vouchers, and seized 11,000 bitcoin wallets worth about 1 million euros, authorities said Friday.

Black Hat 2015: Cracking just about anything

Researchers at the Black Hat conference next week will show how to crack Internet routing protocols, malware-detecting honeypots radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid...

Ad group urges FTC to reject right to be forgotten in US

Enforcing the European regulation in the US could open the door to other rules

data breach map intro leak bucket water

Why does SQL injection still exist?

I delivered a few talks in Singapore and in Manila and was struck by the fact that we’re still talking about SQL injection as a problem.

neiman marcus exterior

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and file a class-action lawsuit against Neiman Marcus in the wake of...

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

screen shot 2015 07 30 at 3.58.20 pm

Hacker shows he can locate, unlock and remote start GM vehicles

A white hat hacker has posted a video demonstrating how he can use mobile device to intercept GM's OnStar telematics mobile app to unlock and remote start a vehicle.

Researchers improve de-anonymization attacks for websites hiding on Tor

Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them

Google rejects French request to expand right to be forgotten

The right to be forgotten isn't a global law, Google said in a blog post

Critical BIND denial-of-service flaw could disrupt large portions of the Internet

The flaw could be exploited remotely to crash DNS servers by sending them a single packet

Load More