Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday Network of sites
Access to thousands of breached sites found on Russian underground market
A number of the available servers investigated by Flashpoint led analysts to conclude that most of the breaches are from either US, Russian, or German hosting services.
How to secure your business against social media hijacking
Australian businesses and organisations’ widespread use of social media puts them at high risk of being hacked.
Tesla takes ex-employee to court for hacking and sharing confidential info
Tesla has taken a former employee to court for allegedly hacking company data and handing it over to third parties.
China's biggest hacking community to expand hackathons to across Asia & India
China’s biggest hacker community has launched its 2018 Global Hackathon Programme and plans to expand it across Asia, India, the UK and Europe.
Rumours fly about who was behind the PyeongChang Olympics hack
The Olympic Destroyer campaign comes at a precarious time of geopolitical tensions with several possible perpetrators but no conclusive proof.
Oracle MICROS POS vulnerability may compromise 330,000 POS systems
A vulnerability in Oracle’s POS systems may affect more than 330,000 payment systems across the globe, putting files and sensitive information at risk
Ludicrous cybercrime profit means Mafia no longer constrained to the streets
Back in the day it was not uncommon for people to ransack stagecoaches and rob armoured trucks, but now they’re robbing servers.
In depth: A lawyer's perspective on ethical hacking & penetration testing in Asia
What is‘ethical hacking’ in an organisation and are there any grey areas in the law? We sat down with RHTLaw Taylor Wessing’s Jack Ow to find out.
How hackers can wreak havoc on connected vehicles & ITS
In today’s connected world of smart devices and ever-increasing volumes of disruptive and destructive cyber attacks, ITS cybersecurity is mandatory.
Expert says Germany’s ‘hack back’ proposal is a slippery slope
German intelligence has urged to be granted legal authority to ‘hack back’ in the event of international cyberattacks - is it the right idea though?
State-sponsored election hacks are acts of cyber warfare - survey
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country’s election.
US judge squashes Yahoo's attempt to stop data breach lawsuits
Both Yahoo and victims of its multiple data breaches have been granted – and denied – the ability to dismiss lawsuits after its massive data breaches.
It's possible for cyber attackers to change what's in your emails
A newly-discovered exploit called ROPEMAKER allows an attacker to remotely change the content of any email post-delivery.
Upside-down flag prompts hack against Malaysian websites
The hackers used the words “Bendera Negaraku Bukanlah Mainan”, which loosely translated, means ‘my country’s flag is not a toy’.
Malware in your DNA sequence data? Technically, it’s possible
Could hackers exploit your DNA sequence and encode it with malware? A new study from the University of Washington says yes, it’s possible.
Aussie startup pre-empts hackers with smartphone tech that blocks NFC attacks
All it takes is for malicious code to be injected through the NFC feature on a smartphone and a hacker pushing out malicious RFID signal to a phone."
Chinese firm hacks way to success at Microsoft Hackathon
China-based IT firm Ping An Technology was the only Chinese company to be invited to Microsoft’s Hackathon in the US this year.
Mandiant security researcher stung by hackers - parent co FireEye denies entire network breach
It seems that not even security experts are immune to hacks, after reports surfaced this week that one unlucky researcher was hit by hackers.
Sententia talks IoT hacking, surveillance & modem backdoors at ASIAL Conference
“The internet is filth. It’s hackers and rats, infiltrating the internet. It’s our job to make it clean.”
Arbor Networks ponders what triggered the DBE hack - and how attackers did it
Questions abound on what triggered recent DBE website hacking and Arbor Networks ponders on possible tactics used.
Inside NZ's 'ethical hacking' firm and its quest to make systems safer
"For organisations running Windows 7 or older, upgrading to Windows 10 will bring enhancements that help to protect against such vulnerabilities."
How education can avoid being the next hacking target
Article from security experts Sedara looking at the unique security threats the education sector's IT face.
Hooligans! Mexican bike gang charged with hacking Jeep Wranglers
Nine members of a Mexican-based motorcycle gang have been charged with stealing 150 Jeep Wranglers worth at least $US 4.5 million
Gemalto's perspective: Hacking for the greater good
Ethical hackers are now one of the most important and effective tools at strengthening collective security and making the cyber landscape safe.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.