How to better protect your WhatsApp account with two-step verification (2SV)Feb 13, 2017, 08:56 AM Ben Gane
WhatsApp has released a new two-step verification (2SV) feature that allows its 1.2 billion users to verify themselves on a new device. The maker of the end-to-end encrypted messaging app announced the new feature back in November 2016...
Apple iCloud didn’t wipe ‘deleted’ browser histories for over a yearFeb 13, 2017, 08:52 AM Ben Gane
Yesterday Russian computer forensic firm Elcomsoft rang the alarm, warning that it was possible to extract users’ Safari browsing history over a year after the user believed that they had deleted their browsing history.
Nomophobia is putting relationships at risk, experts warnFeb 13, 2017, 08:48 AM Ben Gane
Smartphone dependency has reached new extremes, with 79% of Britons feeling anxious if they don’t have access to their phone at any one time. This fear of being disconnected from mobile devices, known as Nomophobia...
Brute Force RDP Attacks Plant CRYSIS RansomwareFeb 13, 2017, 08:41 AM Ben Gane
In September 2016, we (Trend Micro) noticed that operators of the updated CRYSIS ransomware family (detected as RANSOM_CRYSIS) were targeting Australia and New Zealand businesses via remote desktop (RDP) brute force attacks...
Is Cloud BDR Right for Everyone?Feb 13, 2017, 08:34 AM Ben Gane
Everyone seems to be talking about the cloud these days. The cloud is an IT miracle worker. The cloud solves everything. That’s what so many people seem to believe, anyhow. But is cloud backup and disaster recovery right for everyone?...
20 years of top-secret data stolen; NSA contractor faces 200 years in prisonFeb 10, 2017, 13:00 PM Ben Gane
An NSA contractor was indicted Wednesday by the federal grand jury over a massive theft of top secret national security data, announced the Department of Justice. Former Navy officer and 52-year-old Harold Thomas Martin has allegedly been stealing...
French man sues Uber after privacy bug led wife to suspect adulteryFeb 10, 2017, 12:51 PM Ben Gane
Modern technology has probably done more than its fair share to ignite illicit relationships, but it can also lead to a romantic affair’s unravelling. But if your wife or husband becomes aware of an adulterous entanglement through a buggy app, do you blame yourself for having the affair in the first place, or do you blame the software that couldn’t be trusted to keep its mouth shut?
How to create a robust data backup plan (and make sure it works)Feb 10, 2017, 12:46 PM Ben Gane
Ransomware ran amok in 2016. Prominent crypto-malware strains like Jigsaw, Chimera, and Petya/Mischa had a field day encrypting unsuspecting users' data (and made a lot of money in the process, too).
Positive Technologies launches PT VIP Protect to allow mobile operators to safeguard high-profile figures from targeted phone hacksFeb 10, 2017, 12:44 PM Ben Gane
Cyber security company Positive Technologies has today launched PT VIP Protect, a technology designed to keep sensitive targets safe from the current and evolving threats from mobile phone hacking. Key business executives, celebrities, and other high-profile individuals...
Server security, that stands the test of timeFeb 9, 2017, 12:45 PM Ben Gane
Classic and modern… often standing side by side. Many of the world’s greatest cities are incredible collections of architectures, some old and some new, coming together for a common purpose. Not unlike these cities, any great enterprise still has the legacy platforms on which it has built its foundation...