Attackers place crypto-jacking apps in Microsoft App Store
Microsoft has removed eight applications from its app store for Windows that were mining Monero crypto-currency without users' knowledge.
Lucian Constantin | 18 Feb | Read more
Microsoft has removed eight applications from its app store for Windows that were mining Monero crypto-currency without users' knowledge.
Lucian Constantin | 18 Feb | Read more
Teams of Australia’s brightest developers turned out for the first digi.spark hackathon in Sydney this weekend as part of the New South Wales Spark Festival.
he National Institute of Standards and Technology (NIST) plans to add over 200,000 Android and iOS apps to a software library that helps digital forensics investigators target potential evidence.
Hackers love health apps because their popularity has outpaced the industry's ability to safeguard them. Technology experts discussed the privacy and security risks at a House hearing July 14 with the Energy and Commerce subcommittee.
Xuanyan Ouyang | 27 Jul | Read more
Iran has ordered messaging apps to transfer data and activity records of Iranian users to local servers within one year, a move that will give the country a greater ability to monitor and censor the online activity of its people.
John Ribeiro | 30 May | Read more
Ransomware has become a real scourge for consumers, businesses and even government institutions. Unfortunately, there's no end in sight, so here's what you should know.
Lucian Constantin | 05 Mar | Read more
Everyone was up in arms when Google rejiggered its privacy policies to allow its various services to talk to each other, but now Microsoft's taking a page from the same playbook to bring more intelligence to its various Office products--and allow third-party developers to tap into your data to create seamless experiences inside of Office products.
Brad Chacos | 30 Apr | Read more
Almost a year after tipping its hand at Google I/O 2014, Google announced Android for Work, a way to lock down sensitive business data on personal Android phones owned by employees--using versions of Android either old or new.
Mark Hachman | 26 Feb | Read more
When the security-focused Blackphone started shipping in June the phone came with a lot of limitations. Nowhere was that more apparent than with third-party apps, which could end up crashing due to a user's privacy preferences. Blackphone, the company, will look to improve that situation in January when the company rolls out a brand new app store to its users.
Experts at GCHQ aimed to teach civilians and military personnel how to defend against cyber attacks at the army's Defence Academy in Wiltshire today.
Endpoint security firm Verdasys has renamed and re-launched itself as Digital Guardian in honour of its flagship software product, the company has announced.
John E Dunn | 06 Aug | Read more
Retail and financial services organisations have become over-reliant on high-level compliance regimes such as PCI DSS to shore up their networks against data breaches, a survey of 400 UK and US organisations by security firm Tripwire has suggested.
John E Dunn | 02 Aug | Read more
Prime minister David Cameron invited young technology companies to pitch at No. 10 Downing Street for the first time ever yesterday in a move that suggests the politician is keen to be seen supporting the tech start-up community.
In the old days it was easy. Teach your kids to cross the road safely, stay in well lit areas and avoid contact with strangers. Do those things and life was pretty safe. But today, our children are "friends" with people they have never met and are unlikely to meet IRL (in real life – because now we speak in acronyms and initialisations rather than real words!).
Anthony Caruana | 11 Jul | Read more
Credit cards, social security numbers, logins--each of us passes enough personal information through our PCs and mobile devices to complete a dossier. All that data isn't just tough to remember, it's also difficult to keep secure. Writing everything down on a piece of paper or in a text file or PDF is risky, but do you really want to encrypt your hard drive for a few lousy passwords and account numbers?
Jon L. Jacobi | 24 Feb | Read more