Skip to main content

Geanonimiseerde gegevens blijken toch ni...

Geanonimiseerde gegevens blijken toch niet zo anoniem

Onderzoekers van Universiteit Leuven en het Imperial College Londen hebben ontdekt dat het de-anonimiseren van geanonimiseerde datasets makkelijker is dan tot voor kort werd aangenomen . Ze hebben dit aangetoond door middel van een model dat schat hoe makkelijk het is om een dataset te de-anonimiseren. Geanonimiseerde gegevens worden overal voor gebruikt: medisch onderzoek, gepersonaliseerde […]

Ransomware and the enterprise: A new whi...

Throughout 2018 criminals have continued to target large organizations with ransomware. Today we introduce a new white paper that explains why ransomware is still a serious threat to your organization – regardless of size – and what can be done to reduce exposure to, and damage from, ransomware attacks. The paper focuses on three particularly […]

Before Using Birth Control Apps, Conside...

Hotlittlepotato Score one for the quantified self-surveillance movement. Last week, the US Food and Drug Agency approved the first-ever, over-the-counter digital contraceptive—a polished and almost preternaturally upbeat mobile app called Natural Cycles . Basal body temperature readings and monthly menstruation data feed into an algorithm that tells users whether or not they should be having […]

Smart irrigation systems vulnerable to a...

Smart irrigation systems vulnerable to attacks, warn researchers

Security researchers have warned of a potential attack that – using a “piping botnet ” of internet-connected irrigation systems that water simultaneously – could impact a city’s water system to the point of actually draining its reserves. A team of six academics from Ben-Gurion University of Negev, Israel, identified and analyzed security flaws in the […]

Signature Validation Bug Let Malware Byp...

apple-mac-code-signing

A years-old vulnerability has been discovered in the way several security products for Mac implement Apple’s code-signing API that could make it easier for malicious programs to bypass the security check, potentially leaving millions of Apple users vulnerable to hackers. Josh Pitts, a researcher from security firm Okta, discovered that several third-party security products for […]

World’s biggest DDoS marketplace taken d

An international law enforcement operation has shut down a website widely thought to be the world’s biggest marketplace for hiring distributed denial-of-service ( DDoS ) attacks, according to an announcement by the United Kingdom’s National Crime Agency (NCA). The website, webstresser.org, was taken down on Wednesday, April 25, following […] .

Another Shady App Found Pre-Installed on...

oneplus-logkit-app

The OnePlus Saga Continues… Just a day after the revelation of the hidden Android rooting backdoor pre-installed on most OnePlus smartphones, a security researcher just found another secret app that records tons of information about your phone. Dubbed OnePlusLogKit , the second pre-installed has been discovered by the same […] .

Latest NSA Leak Reveals Exactly the Kind...

The details of an apparent Russian state-sponsored cyberattack on local election officials and a vendor of U.S. voting software are shocking—but they shouldn’t be surprising. In fact, experts had been warning for months before the 2016 election about exactly the type of attack that was revealed Monday in leaked […] .

Another Ransomware Nightmare Could Be Br...

Just as the reverberations from last week’s WannaCry ransomware outbreak have started to slow, a new threat has already cropped up. A virulent ransomware strain called XData has gained momentum in Ukraine, so far leading to about three times as many infections as WannaCry did in the […] .