Home Page

Like a subgroup of the Internet of Things, connected toys are the new generation of children’s toys – often using Wi-Fi and an iOS or Android-based remote control to manage and manipulate a car, quadcopter, or Lego robot.
Posted: February 27, 2015 2:22 pm
SIM card maker Gemalto has confirmed that its network was hacked – probably by the NSA and GCHQ – but said the breach could not have resulted in a massive theft of encryption keys.
Posted: February 25, 2015 2:09 pm
Pavel Durov, founder of the Russian social network VKontakte, was home alone in his apartment in St. Petersburg on a weekend when a contingent of men in camouflage uniforms knocked violently on his door.
Posted: February 19, 2015 11:23 am
French telecommunications equipment company Alcatel-Lucent has published a report compiled by its Motive Security Labs division, which found that malware infections in mobile devices increased by 25 percent in 2014, compared to a 20 percent increase in 2013.
Posted: February 15, 2015 1:41 pm
Users of Microsoft ’s flagship Internet browser who visited Forbes.com on the four days following Thanksgiving were open to be hacked, two cybersecurity firms said Tuesday.
Posted: February 11, 2015 7:42 pm
(Reuters) – Health insurer Anthem Inc, which earlier this month reported that it was hit by a massive cyberbreach, said on Tuesday that 8.8 million to 18.8 million people who were not its customers could be victims in the attack.
Posted: February 25, 2015 2:34 pm
Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said.
Posted: February 19, 2015 11:43 am
New research suggests more than 1 billion data records were stolen from more than 1,500 individual data breaches last year. The latest findings from Gemalto, an enterprise security firm, represent a significant year-over-year increase in both corporate breaches and data theft.
Posted: February 15, 2015 1:41 pm
I squatted down in the dirt and took stock of my inadequate tools. Over my left shoulder a massive John Deere tractor loomed. I came here to fix that tractor. So far, things weren’t going as planned. I’m a computer programmer by training, and a repairman by trade.
Posted: February 11, 2015 8:58 pm
Facebook has launched ThreatExchange, a social network of sorts designed to allow companies to share information and intelligence about cyberthreats. The move is the latest example in how an age of cooperation may be emerging as companies increasingly battle cyberattacks of various stripes.
Posted: February 11, 2015 11:32 am
When it comes to data breaches, retailers are one of the biggest targets these days, and today we have some detail on the costs around one of the more high-profile attacks.
Posted: February 27, 2015 1:07 am
Amsterdam, February 25, 2015 – Following the release of a report by a news website on February 19, 2015, Gemalto (Euronext NL0000400653 GTO), has conducted a thorough investigation, based in particular on two elements: the purported NSA and GCHQ documents which were made public by this website,
Posted: February 25, 2015 1:40 pm
PALO ALTO, Calif. — In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.
Posted: February 15, 2015 1:41 pm
MasterCard and Visa are ramping up cybersecurity efforts for online and mobile transactions.
Posted: February 15, 2015 1:41 pm
IBM Security found that over 60% of leading Android dating mobile apps they studied are potentially vulnerable to a variety of cyber-attacks that put personal user information and corporate data at risk.
Posted: February 11, 2015 7:42 pm