Dating site Coffee MeetsBagel warns Aussie users of data breach on Valentines Day
Roses are red, violets are blue, hackers will hack, and now they know you.
Roses are red, violets are blue, hackers will hack, and now they know you.
More than a third of reported Australian data breaches are due to human error, the Office of the Australian Information Commissioner (OAIC) has revealed as it released its first full-quarter statistical report about the functioning of the new Notifiable Data Breaches (NDB) scheme.
David Braue | 31 Jul | Read more
Hackers stole data of more than 150 million users of a wildly popular fitness and dietary tracking app MyFitnessPal, as announced by its parent company Under Armour on Thursday, March 29.
Harold Kilpatrick | 09 Apr | Read more
Dr Charlie Miller has been tagged as one of the world's best hackers after compromising a Jeep Cherokee from 10km with his colleague Chris Valasek.
Anthony Caruana | 13 Oct | Read more
UK's guidance for smart car makers encourages defence-in-depth, encryption, and software updates.
The UK's National Crime Agency trials weekend camps that aim to steer young cybercriminals towards cybersecurity.
Five years ago, if you had asked your average CSO what the biggest threat to their network was, odds are that they wouldn’t have even thought about mentioning their own dishwasher.
David Braue | 25 Jul | Read more
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
Grant Gross | 08 Mar | Read more
Anyone can connect to a CloudPets toy as long as they're in Bluetooth range.
More than 100 members of the Israel Defense Forces, the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices.
Lucian Constantin | 17 Feb | Read more
Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account.
John Ribeiro | 14 Feb | Read more
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.
Michael Kan | 14 Feb | Read more
The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source end-to-end encrypted email standard that promises surveillance-proof messaging.
Michael Kan | 21 Jan | Read more
U.S. National Security Agency leaker Edward Snowden will be allowed to stay in Russia for "another couple of years," according to a spokeswoman for the government there.
Grant Gross | 19 Jan | Read more
When Donald Trump is inaugurated as the U.S. President on Friday, Juan Soberanis intends to protest the event -- digitally.
Michael Kan | 18 Jan | Read more