During a routine web-mapping project, cybersecurity researchers found that large chunks of a massive database belonging to biometric security platform BioStar 2 were unencrypted and unsecured. Dark Reading reported that the researchers discovered …
Many of us are online throughout the day, going from device to device. We might wake up with our iPhone, switch to an Android tablet, then a Windows laptop for work.
If you didn’t go to the Black Hat or DEF CON cybersecurity conferences last week in Las Vegas, we’ve got a quick summary of some of the best stories, presentations, social media, and just plain weirdness.
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the ‘like culture’ on our children’s mental health. The need to generate likes online has become a biological compulsion for many teens and let’s be honest – adults too! The rush of dopamine that surges through […]
The post How To Help Your Kids Manage Our ‘Culture of Likes’ appeared first on McAfee Blogs.
In the largest global study of the Internet of Things in consumers’ homes, researchers from Avast and Stanford University have shown a surprising emergence of IoT devices in consumer homes and shed light on troubling number of devices that continue to …
The European Union’s General Data Protection Regulation (GDPR) has become the world’s gold standard for user privacy and breach disclosure regulation. It affects any business around the world that processes or stores the personal data of individuals re…
The European Union’s General Data Protection Regulation (GDPR) has become the world’s gold standard for user privacy and breach disclosure regulation. It affects any business around the world that processes or stores the personal data of individuals re…
A seven-year mystery surrounding the unlocking of over 2 million AT&T phones has culminated in the arrest and trial of 34-year-old Muhammad Fahd. Wired reported that Fahd stands accused of bribing AT&T employees to unlock phones – an illeg…
Creating malware that is capable of making money takes little to no ability to write original computer code, recent research by Avast has shown. All that’s needed is the ability to bundle existing tools together using publicly available snippets of cod…
Avast researchers announced this week that the company has protected more than 253,000 users from Clipsa, a password stealer that steals administrator credentials from unsecured WordPress websites.