Facebook told by Belgian court to stop tracking non-users
A court has given Facebook 48 hours to stop tracking people in Belgium who are not members of its social network. Facebook says it will appeal against the decision andRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
A court has given Facebook 48 hours to stop tracking people in Belgium who are not members of its social network. Facebook says it will appeal against the decision andRead More →
CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a file’s name along with its data. We were alerted to this new variant by variousRead More →
Experts at Bitdefender have discovered a flaw in Linux Encryption Ransomware Linux.Encoder1 that exposes the decryption Key used to lock the files. Last week security experts at Russian antivirus firmRead More →
Coding mistakes in a malicious program that encrypts data mean anyone hit by the Power Worm virus will not be able to recover files, say security experts. Usually viruses knownRead More →
In April 2014 the cybersecurity world was rocked by the discovery of Heartbleed, the name given to a vulnerability found in one of the systems we use to securely communicateRead More →
Facebook’s is always changing and its team is adding new functionality every couple of months. With new changes there are chances of affecting security and introducing vulnerabilities explains an informationRead More →
Timing attacks are an interesting part of computer security. As an extreme example, imagine that your computer took one second to verify each character in your login password. And nowRead More →
Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting company’s new terms and conditions. Snapchat is oneRead More →
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two if you spend a lot of time inRead More →
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details. According to the Mobile Phone provider firm, hackersRead More →
My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the addition of a TV DVR system to myRead More →
US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty program. What happen when bug hunters have to work with high sensitiveRead More →
Timing attacks has proven practical since 96′ as shown in a paper by Paul C. Kocher. In his paper Paul demonstrate how, by effectively measuring the amount of time requiredRead More →
Does your Chrome browser seem a little “off”, but you can’t figure out why? Maybe it’s eFast. Here’s another reason to slow down when installing software, especially free software. ARead More →
It could have been just another one of those jostlings that happen on the train: a man bumped into a writer for SC Magazine. Except, as Roi Perez tells it,Read More →
The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals. If you are a fan of Hollywood movies you may be familiar withRead More →
Despite its controversial nature, the US Senate has passed the Cybersecurity Information Sharing Act (CISA). Detractors are concerned because CISA would open up an information exchange between the public andRead More →
Buying and selling things online are just two of the many activities Internet users are fond of doing. For some, they shop for clothes, bags, shoes, jewelries, and books; forRead More →
The deputy director of the US National Security Agency (NSA), Richard Ledgett, has warned of the increasing danger of destructive cyber attacks by states. He told the BBC: “If youRead More →
Two weeks after authorities announced they had taken down the botnet behind the banking malware Dridex, new research suggests the threat is alive and well. Researchers with security company Invincea announced todayRead More →