An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
The post DDoS attack on feminist blog backfires on International Women’s Day appeared first on We Live Security.
ESET
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
The post DDoS attack on feminist blog backfires on International Women’s Day appeared first on We Live Security.
The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed by the Government Accountability Office (GAO).
The post Air traffic control vulnerability could allow criminals to hack the skies appeared first on We Live Security.
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.
The post Lysa Myers: “There are still only a handful of women in the security field” appeared first on We Live Security.
Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.
The post Adobe crowdsources its bug-hunting, but no rewards offered appeared first on We Live Security.
In this post, we lift the veil on Casper – another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.
The post Casper Malware: After Babar and Bunny, Another Espionage Cartoon appeared first on We Live Security.
Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach last month that could have affected up to 80 million of its customers.
The post Anthem refuses IT security audit following massive data breach appeared first on We Live Security.
Here’s a small selection of alternatives to Bitcoin – each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however – minimal or zero transfer fees, and freedom from traditional banking restrictions.
The post Five alternatives to Bitcoin appeared first on We Live Security.
Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.
The post Fake Amazon gift cards offer only malware to Android devices appeared first on We Live Security.
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.
The post FREAK attack: security vulnerability breaks HTTPS protection appeared first on We Live Security.
Account holders with Toys “R” Us have been informed that their passwords will be reset, after unauthorised third-parties attempted to gain access to the company’s reward program.
The post Toys “R” Us resets account passwords to counter stolen reward points appeared first on We Live Security.