A survey of companies in the U.K. more than half are willing to hire a hacker to help deal with a shortfall of cyber-security professionals. The finding comes from a survey of 300 senior IT and HR professionals in organizations with 500 or more staffers.
The increasing awareness of the cyber threat means the majority of U.K. companies are clear on their strategy for dealing with any skills gaps. Rather than relying on hackers to share their secrets, or throwing money at off the shelf programs that quickly become out of date, U.K. companies need to take stock of their cyber defense capabilities and act on the gaps that are specific to their own security needs.
Read morePrivacy has never been “an absolute right”, according to the new director of GCHQ, who has used his first public intervention to accuse US technology companies of becoming “the command and control networks of choice” for terrorists.
He said a new generation of freely available technology has helped groups like Islamic State to hide from the security services and accuses major tech firms of being “in denial”, going further than his predecessor in seeking to claim that the leaks of Edward Snowden have aided terror networks. The new director says Isis differs from its predecessors in the security of its communications, presenting an even greater challenge to the security services.
Read moreAndroid is well known for its seemingly never-ending customization options and its permissive rooting credentials among other things. Distributions that cannot be modified to enable elevated permissions are quite rare, as enthusiasts seek to have virtually every possible feature available at their disposal.
But should you pursue that path? Does root provide what you need, or what you think you need? There are a couple of good reasons why you probably should root Android, but root is not for everyone, as the risks can far outweigh the benefits and you are likely to regret your decision once things get messy. So here is why you should not do it.
Read moreThe National Institute of Standards and Technology is warning users of a newly discovered Zero-Day flaw in the Samsung Find My Mobile service, which fails to validate the sender of a lock-code data received over a network.
The Find My Mobile feature implemented by Samsung in their devices is a mobile web-service that provides samsung users a bunch of features to locate their lost device, to play an alert on a remote device and to lock remotely the mobile phone so that no one else can get the access to the lost device. The flaw allows an attacker to remotely lock or unlock the device and even make the device rings too.
Read moreMost computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.
Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.
Read moreA company that develops cyber security and information security products and services to defend organizations against cyber attacks and to protect critical assets has published a new report and introduced a list of countries most under threat from cyber attack.
APTs are complex attacks by hackers for which complicated techniques are used to sneak into a network and carry out prolonged information gathering attacks. They are often carried out by state-backed players or sophisticated criminals and have an element of human control, in contrast with some cyberattacks solely carried out by an automated piece of code.
Read moreMinister of Justice in the UK government announced plans to introduce a more severe punishment for internet trolls who publish online offensive material or threats to other people.
Now for such offenses in the country, you can get up to six months in prison. However, the authorities intend to review the law and increase the term. New measures have caused outrage among some users. Laws to deal with internet “trolling” already exist in the UK and newly-proposed legislation makes many worried about democracy and freedom of expression Gavin Macfadyen, director of the Centre for Investigative Journalism told in his interview.
Read moreImagine being able to download a full HD movie in less than three second, or back your entire computer up in less than a minute without the need for any cables. Samsung has announced that it has made a breakthrough in Wi-Fi technology which will allow a 1GB file to be downloaded in less than three seconds.
Samsung claims it is able to eliminate a problem where too many signals from different smartphones, tablets or computers cause interference, which hampers speed. It’s worth noting though, that this new breakthrough doesn’t suddenly mean you will have faster internet, your internet service provider controls that. This simply means faster connections in your internal network between devices.
Read moreInventors of surveillance systems reported to authorities that it is possible to track absolutely any user who has a mobile phone, and the location of a person is not important, it doesn’t matter whether he is near or in another country.
The most famous intelligence services around the world, such as the National Security Agency of the USA and The Government Communications Headquarters of the United Kingdom use information from mobile phones for a long time. However, due to the new systems in countries that are less developed technically, it is possible to track people around the world easily. How does the system work?
Read moreThieves were regularly using high-tech devices to access cars with electric locks. These devices were originally intended for locksmiths to get into cars without a key, but can have devastating consequences in the wrong hands.
The gadgets are able to spoof the radio frequencies sent out by key fobs, and if they find the right one the door will simply open. Sky said that it is possible to hack any of 50 low-powered computers in a modern car in less than 10 seconds. Here's a paper looking at how the attacks work, and what can be done. There are also various videos online which apparently show how to hack key fobs. Underneath one video a commenter asks, tongue in cheek, "do they have the frequencies for Lamborghinis?"
Read moreAxarhöfði 14,
110 Reykjavik, Iceland