search slide
search slide
pages bottom
Currently Browsing: Results for Tag "Cybersecurity"

Acer suffers US data breach, extent of damage unknown

Acer suffers US data breach, extent of damage unknown The Taiwanese company filed a breach report to the Office of the Attorney General in California, which describes the details of the breach that occurred between May 12th and April 28th, 2016.The report says that some customers may have had their personal details, including names, addresses, credit card numbers and their 3-digit security codes stolen from its e-commerce store.

Microsoft details the security pros of upgrading to Windows 10

Microsoft details the security pros of upgrading to Windows 10 He emphasised the importance of Windows 10’s platform architecture, pre and post-breach defense, and identity and information protection.“Hardware based isolation, with Virtualization Based Security (VBS), is one of the key ways we’ve hardened against attacks with Windows 10,” Lefferts explains.

Avast buying antivirus tool AVG for $25 per share and $1.3 billion in total in all-cash deal

Avast buying antivirus tool AVG for $25 per share and $1.3 billion in total in all-cash deal Antivirus software has always been a staple in the Windows user software repertoire, and two of the most familiar names in the market is now becoming one.The combination is expected to expand Avast’s control of 22% of the market; at 32% premium share price, the offer is not a bad deal for AVG either.

Tech Futures Lab here to re-engineer your career

Tech Futures Lab here to re-engineer your career Frances Valintine is the founder at Tech Futures Lab, she says that with the rapid advance and integration of technology across all sectors, it’s crucial that NZ businesses commit to skill development.Also behind The Mind Lab, Valintine believes that change in the technological revolution is occurring much faster than most anticipated.

FBI, cybersecurity experts investigating potential Russian ties to DNC email leak

FBI, cybersecurity experts investigating potential Russian ties to DNC email leak ” That report claimed the hackers so thoroughly penetrated the DNC’s servers that they gained complete access to email and chat traffic.At the time, the Post reported that the hackers might have had access to the DNC’s servers for up to a year.

How the US military is training machines to protect its digital assets

How the US military is training machines to protect its digital assets Welcome to the Cyber Grand Challenge, a DARPA hosted event at the Paris Hotel and Casino in Las Vegas, Nevada.Much of the technology behind the self-driving car was the result of a DARPA Grand Challenge, as well as the robotic expertise that will likely assist in future missions to Mars.

Afraid someone is misusing your webcam? Here's some tips for protection

Afraid someone is misusing your webcam? Here's some tips for protection And thanks to Windows Sysinternals, there is a handy software for that – Process Explorer.As soon as you run the tool, you will need to know the object name of your webcam to identify processes connected to it.

ESET report says millennials are cyber-savvy – and also cyber-careless

ESET report says millennials are cyber-savvy – and also cyber-careless The generation gap is large and in this case millennials would be wise to listen to baby boomers (55-65-year-olds), according to new research from ESET.The report,'ESET Australia and New Zealand cyber-savviness report 2016 part 2: The differences in cybersecurity practices across generations', found that 46% of millennials use the same password for all accounts on personal devices - compared to only 18% of baby boomers.

ESET disvers new Android botnet ntrolled by Twitter

ESET disvers new Android botnet ntrolled by Twitter ESET has discovered the first-ever Twitter-controlled Android botnet.Detected by ESET as Android/Twitoor, it’s the first malicious app using Twitter instead of a traditional command-and-control (C&C) server, the company explains.

Trend Micro tackles ransomware threat with new software

Trend Micro tackles ransomware threat with new software According to Tim Falinski, consumer director, Trend Micro New Zealand, Trend Micro’s security solution defends users against well-known dangers, but it also addresses the risks of new attacks, including ransomware.“Cybercriminals are everywhere, watching and waiting for their next victim to get too comfortable and relaxed with their digital footprint,” says Falinski.

IoT devices likely drove Friday Internet blackout, some products already recalled

IoT devices likely drove Friday Internet blackout, some products already recalled A few weeks ago, security researcher Brian Krebs, author of the blog Krebs on Security, was driven offline by mammoth DDoS attacks driven by IoT devices.The attack now seems to have been a warm-up for last Friday’s wide-scale internet outage, and security researchers suspect that Internet of Things products were once again to blame.

Waikato Uni cybersecurity head says new taskforce will set the untry in the right direction

Waikato Uni cybersecurity head says new taskforce will set the untry in the right direction With the government's new Cyber Security Skills Taskforce announced, it's now ready to take on the urgent need for action about the country's cybersecurity skills shortage.Dr Ryan Ko, The University of Waikato's Cybersecurity Programme head, was one of the eight people elected to the taskforce by the government.