Tech giant Microsoft recently announced that it will drop a lawsuit against the U.S. government after the Department of Justice (DOJ) changed data request rules on alerting Internet users about agencies accessing their information. The lawsuit filed in April...
On October 24, 2017, Ukraine, Russia, Japan, and Bulgaria were hit by a wave of cyber attacks. Reuters reported that Ukraine’s Odessa airport and metro system in Kiev were targeted by a malware called “BadRabbit” and prompted state-run Computer...
To address cyber crimes, the Indian government is trying to protect imported power equipment. To avert cyber attacks on electricity grids, tough measures such as multiple checkpoints will be deployed to ensure that equipment imported for the domestic power...
The row between the U.S. government and Kaspersky Lab seem to have reached a culmination. Eugene Kaspersky, the founder of Kaspersky Lab, has chosen to stick to his roots and origin and doesn’t plan to move the Moscow-based firm...
The government of Ghana is mulling on establishing a national cybersecurity center to safeguard the nation against cybercrime. According to the President Nana Akufo-Addo, the nation is making leaps in terms of digital addressing system, e-payments, digital financial services...
Senior Senator from Arizona John McCain on October 19 suggested that Senate Armed Services Committee chaired by him may consider issuing a subpoena to make a White House’s top cybersecurity official testify. McCain’s warning was a result of the...
Britain’s cybersecurity agency National Cyber Security Centre (NCSC) CEO Ciaran Martin on October 21, 2017 revealed that Northern Ireland infrastructure has been hit by "significant" online attacks from hostile nations.
43-year-old Omagh-born Martin made the revelation on a two-day visit...
Quick Service Restaurant Chain Pizza Hut reportedly suffered a massive data security breach on October 1 and October 2. The chain notified the patrons nearly two weeks after the hack.
In a damage control exercise, Pizza Hut is now offering...
A recent global survey revealed what percentage of information technology professionals access unauthorized resources and who snoops more – executives or middle management, big companies or small ones. The findings were an eye opener, as the survey exposed global...
Any device using Wi-Fi Protected Access II (WPA2) encryption could allow nearby attackers to intercept and steal data transmitted across a Wi-Fi network, as it is reportedly vulnerable to newly discovered series called Key Reinstallation Attacks (KRACKs).
KRACKs that have...