search slide
search slide
pages bottom
Currently Browsing: Results for Tag "Cybersecurity"

Bad experiences for almost 70 percent of Kiwi online daters - tips for success

Bad experiences for almost 70 percent of Kiwi online daters - tips for success If you’re planning to find your Mr or Mrs Right online, then it would pay to take note of the New Zealand Norton Online Dating Survey first.In fact, 55 percent of respondents are spending at least an hour a day on online dating sites, with 53 percent of users finding it difficult to identify scammers.

Microsoft bolsters global fight against cybercrime with new facility in Mexico

Microsoft bolsters global fight against cybercrime with new facility in Mexico Not all heroes wear capes — in fact, some of them wear glasses and sit on the IT team at Microsoft.On Friday, the technology company announced the launch of a new Cybersecurity Engagement Center in Mexico as part of its global initiative to bolster IT security.

NMIT launches postgrad diploma to boost NZ's cybersecurity skills

NMIT launches postgrad diploma to boost NZ's cybersecurity skills The Nelson-Marlborough Institute of Technology (NMIT) is the latest institution to deliver cybersecurity training to IT staff, with the launch of its new postgraduate diploma programme.The NMIT Post-Graduate Diploma in IT Security Management is being offered in the institute’s Auckland campus to domestic and international students.

This is why you should be terrified of the Wikileaks Vault 7 data dump

This is why you should be terrified of the Wikileaks Vault 7 data dump If it has a chip, an operating system, power and is connected to the internet, it fits the profile.As a spy agency, CIA’s job is to spy on those outside the U.

One perfume wants to be the next weapon against cybersecurity attacks

One perfume wants to be the next weapon against cybersecurity attacks The company is partnered with Scarlett London, a well-known fashion and lifestyle blogger based in the U.Together, they have created a dialogue around the importance of cybersecurity and just how devastating a cyberattack can be for those who are not properly protected.

In defense of Kellyanne Conway's astonishingly stupid microwave comment

In defense of Kellyanne Conway's astonishingly stupid microwave comment Over the weekend, Kellyanne Conway talked some nonsense about microwaves.It was only a week ago when WikiLeaks dumped a trove of unverified documents that (among other things) alleged that the CIA could spy on people through their Samsung smart TVs.

Russian spies blamed for massive Yahoo! hack

Russian spies blamed for massive Yahoo! hack This time the focus is on the massive 2014 hack of Yahoo!According to the Washington Post, Russian intelligence members hired two hackers to help them with the Yahoo!

Hackers attempt to extort Apple for $75k

Hackers attempt to extort Apple for $75k A group of hackers calling themselves the ‘Turkish Crime Family’ claim to have access to a large number of Apple email accounts and are holding them ransom for $75,000 in Bitcoin or Ethereum.” David Dufour, senior director of engineering & cyber security at Webroot suggests Apple users err on the side of caution.

If you use Minecraft mods, do your research first

If you use Minecraft mods, do your research first ​Minecraft fans beware: IT security company ESET have discovered 87 malicious apps disguised as mods for Minecraft with close to a total of one million downloads on the android store.This means that 990,000 Android mobile users have been unknowingly exposed to malicious content as well as ad and scam content by installing these fake Minecraft mods.

How your car might be protected from hackers in the future

How your car might be protected from hackers in the future Two senators are trying to defend your future cars from hacks.Ed Markey and Richard Blumenthal (of Massachusetts and Connecticut, respectively) recently reintroduced the SPY Car Act, which aims to protect the control of your vehicle as well as any data a hacker might find there.

Kiwi MPs put security on the table at London parliamentary nference

Kiwi MPs put security on the table at London parliamentary nference Whangarei MP Dr Shane Reti and Taranaki MP Jonathan Young are two delegates representing New Zealand at the International Parliamentary Conference on National Security and Cybersecurity in London this week.Rt Hon David Carter, Speaker of the New Zealand Parliament, says that in light of last week’s terrorist attacks in London, security could not be more important.

Shoddy Security On This Wifi Vibrator Could Make Your Privates Very Public

Shoddy Security On This Wifi Vibrator Could Make Your Privates Very Public It’s the Svakom Siime Eye, and the name ought to give you some idea about its advanced functionality.The Siime Eye is a Wifi-enabled vibrator, purpose-built for giving interested onlookers a truly up-close look at the user’s private parts.

Trump Repeals Internet Privacy Regulations

Trump Repeals Internet Privacy Regulations The regulations, part of the Federal Communication Commission’s 2016 Broadband Privacy Order, were issued during Barack Obama’s presidency.But a new Republican government opposed the limitations, as made clear by recent Senate and House majority votes to eliminate them.

A triumph for cyber security: New Zealand's CERT team has finally been launched

A triumph for cyber security: New Zealand's CERT team has finally been launched Part of the New Zealand Cyber Security Strategy and Action Plan, the project was part of the Government’s Budget 2016 and will received $22.Between 2015 and 2016, 338 incidents affected New Zealand organisations.

Windows users should be really worried about the latest NSA leak

Windows users should be really worried about the latest NSA leak And, if the response of the security community is any indication, America's most famous whistleblower has reason to be alarmed.According to The Intercept, the Shadow Brokers' April 14 release of previously undisclosed tools has the potential to comprise Windows computers running anything earlier than Windows 10 — and possibly even those using the latest Windows as well.

Whoops. Millions of Android phones are wide open to hackers

Whoops. Millions of Android phones are wide open to hackers A group of researchers has determined that hundreds of apps in the store have a gaping security hole that potentially allows hackers to implant malware and steal data from millions of Android smartphones.According to a paper detailing the alleged flaw, the problem lies within apps that create open ports on cellphones.

Spoiler alert: Hackers leak unreleased Netflix series

Spoiler alert: Hackers leak unreleased Netflix series According to reports by Variety, an unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.It remains to be seen if Netflix will move the date forward in light of the leaks.

Staggering New Botnet, 'Hajime' Discovered

Staggering New Botnet, 'Hajime' Discovered Known as “Hajime,” which is Japanese for “begin” or “beginning,” the web of hacked gadgets also isn’t… doing anything.Right now, the botnet has been mostly active in Vietnam, Taiwan, and Brazil, though experts suggest that may change as it spreads.

German intel chief looks to 'wipe out' Russian servers used in cyber attacks

German intel chief looks to 'wipe out' Russian servers used in cyber attacks The head of the German equivalent of the FBI said he'd like the legal authority to "wipe out" servers the Russian government allegedly used to deploy cyber attacks again Germany.Russian hackers grabbed a big chunk of data on the Bundestag — Germany's parliament — in an attack that happened two years ago this month.

SSDs Vulnerable to Deliberate, Low-Level Data Corruption Attacks

SSDs Vulnerable to Deliberate, Low-Level Data Corruption Attacks But a new paper from Carnegie Mellon University, Seagate, and ETH Zurich has shown that the way data is programmed into MLC SSDs makes them vulnerable to data corruption attacks, meaningfully reducing the drive’s lifespan in the process.The first SSDs that were developed stored one bit of data per cell and are called single-level cells (SLCs).