IDG Contributor Network: Data or metadata? For the IoT they’re both important

Think about the most successful, widely scaled networks that let us function in today's world. No I’m not talking about internet service providers, I mean the Really, Really Big Networks....

Yet Another FBI Proposal for Insecure Communications

Yet Another FBI Proposal for Insecure Communications Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications...

Tech Support Scam Losses Rose 86% in 2017

Most victims are in the US, but FBI IC3 has logged cases from 85 different countries.Tech support scams last year resulted in $15 million in losses last year, an increase...

Google says fix for ‘weird’ 1975 text message bug is on the way –...

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

New Malware Hijacks Cryptocurrency Mining

New Malware Hijacks Cryptocurrency Mining This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the...

Uber hit with criticism of “useless” two-factor authentication – Naked Security

Uber is in the computer security news again, this time over allegations that its 2FA is no good. ZDNet, for instance, doesn’t mince its words at all, leading with the headline,...

Don’t download it! Fake Fortnite app ends in malware… – Naked Security

Are you a Fortnite player? Hundreds of millions of people are, but in case you’re not one of them, Fortnite is a computer game from Epic Games, in which players co-operate...

Threats from Russia, North Korea Loom as …

Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.Cyberthreat activity from Russia and North Korea ramped up last year...

The Dangers of Flawed Voice …

Researchers at Black Hat USA will show how vulnerabilities in Microsoft's Cortana highlight the need to balance security with convenience.Security vs. convenience is a delicate balance to strike with new...

Cryptocurrency startup LoopX exit scams with $4.5M in ICO – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

APLICATIONS

Wrong Number: Phone Scammers Run Off With Millions by Impersonating Chinese...

Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates. The...

HOT NEWS