As the coronavirus pandemic forced millions of people to stay home over the past two months, Zoom suddenly became the video meeting service of choice: Daily meeting participants on the platform surged from 10 million in December to 200 million in March, and 300 million daily meeting participants in April.
Zoom promised a 90-day feature freeze to fix privacy and security issues, and the company is delivering on some of those promises. A new Zoom 5.0 update is rolling out this week that’s designed to address some of the many complaints that Zoom has faced in recent weeks. With this new update, there’s now a security icon that groups together a number of Zoom’s security features. You can use it to quickly lock meetings, remove participants, and restrict screen sharing and chatting in mee
When Christopher Boddy was 14 years old, he'd log onto his computer after school to spend hours playing a game that taught him the basics of digital forensics, ethical hacking and cryptography.
It may not have been a typical after-school activity, but it was just what the UK government hoped for when it launched its Cyber Discovery program three years ago: It inspired Boddy, now 17, to consider a career in cybersecurity.
"I originally learned about it in school, but then I'd get stuck on problems that I needed to find the answer to," said Boddy, who lives outside London with his parents. "I'd stay up way later than I should have and postponed homework to get a challenge done."
What started as a school-based program to teach kids a new skill is extending into a virtual cyber ...
JP Morgan Chase, one of the largest banks in the US, said on Thursday that a massive computer hack affected the accounts of 76 million households and about seven million small businesses, making it one of the largest of its kind ever discovered. Reports the Guardian
The attack was under way for a month before it was discovered in July, and when it was disclosed in August, the bank estimated that about one million accounts had been compromised. But the latest information revealed on Thursday showed the attack was vastly more serious than earlier thought.
The bank said financial information was not compromised and that there had been no breach of login information such as account or social security numbers, passwords or dates of birth. However names, email addresses, phone numbers and addr...
Written by Human Rights Watch
(Moscow) – Russia should not impose unjustified regulations on freedom of expression and privacy on the Internet, Human Rights Watch said today. A restrictive new law requires Russian bloggers with significant followings to register with the authorities and comply with the same regulations as media outlets.
On April 22, 2014, Russia’s State Duma adopted amendments to counter-terrorism legislation, including a new law on “Internet users called bloggers.” The law requires bloggers with more than 3,000 daily visitors online to register with Roskomnadzor, the state body for media oversight. Once registered, bloggers will have the same legal constraints and responsibilities as mass media outlets, including verifying information for accuracy, indicating the minimal
Source: CIO East Africa
The African Union’s Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa (AUCC) – which seeks to intensify the fight against cybercrime across Africa in light of rising incidences of cybercrime – has been the focus of debate recently.
In view of this and to further shed light on online security issues in Africa, CIO East Africa sought the views of Ms Sophia Bekele, an internet security expert and international policy advisor over internet and ICT. Below are excerpts:
1. As regards the state of online freedom in Africa, what are the major issues surrounding online freedom of expression in Africa? What is the best way to empower users to stay safe online while protecting their freedom of expression?
Technology-wise, Africa is
Attack of the Tinder bots: 'malicious' download links found in dating app You might think you're chatting up an attractive human, but they could be a malware-toting algorithm. Called Alicia.
Dating app Tinder is hugely popular around the world, with an estimated 4.2m daily users. Now those users are being warned that the service has been "invaded by bots" posing as humans.
Security firm BitDefender has identified the bots, which pose as women to engage Tinder users in text-chat, before seeming to promote a mobile game called Castle Clash, posting a link to a website called Tinderverified.com which is not owned by or associated with Tinder.
"The name of the URL gives the impression of an official page of the dating app and for extra legitimacy scammers also registered it on a reputable ...
Target is out with an update on its big data breach from before the holidays, and it turns out that much more customer information was compromised than the company originally thought.
Target initially said 40 million customers' credit and debit card data was stolen, but now that number has risen to 70 million.
The company also announced that it's not just credit and debit card information that was stolen, but customers' names, mailing addresses, phone numbers, and email addresses as well.
The breach affects customers who shopped at Target in the U.S. between Nov. 27 and Dec.15.
Stolen card information includes customers' names, card numbers, PIN data, and three-digit security codes.
Sales have fallen at Target since the company announced the data breach.
Target is now offering free c
Over the weekend, news broke that tech giant Yahoo was serving advertisements that could allow hackers to gain control over users' computers. That's triggered concerns across the Internet about who's at risk, how users can tell if they've been affected and what people can do about it. Here's an explanation of what happned at Yahoo and how it might affect certain users.
Wait, Yahoo was serving serving up malware?
Yes. The security firm Fox-IT was the first to report the problem on Friday. Basically, users visiting yahoo.com were served ads from ads.yahoo.com. That part is normal. But some of those "advertisements" weren't actually ads. They were malicious software that redirected visitors to a Web site that attempted to take over their computers. If successful, the malicious software, kn
Earlier this Month, Trustwave released their study on a massive botnet, one of many managed using the Pony botnet controller. The researchers gained control of the botnet, taking the place of its Command and Control server. Once in control, they discovered that the botnet had managed to steal about two million passwords from infected computers. They also discovered something that most of us already know: that people are terrible at passwords.
Get To The Passwords
The two million compromised accounts were spread between 1.58 million website credentials, 320,000 email logins, 41,000 FTP accounts, 3,000 Remote Desktop credentials, and 3,000 Secure Shell account credentials is a significant haul. The concern, of course, is how many of the affected users had selected the same password for othe
Hackers have stolen usernames and passwords for nearly two million accounts at Facebook, Google, Twitter, Yahoo and others, according to a report released this week.
The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world, researchers at cybersecurity firm Trustwave said. The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
On Nov. 24, Trustwave researchers tracked that server, located in the Netherlands. They discovered compromised credentials for more than 93,000 websites, including:
318,000 Facebook (FB, Fortune 500) accounts
70,000 Gmail, Google+ and YouTube accounts
60,000 Yahoo (YHOO, Fortune 500) ...
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.