Four big toy firms have agreed to terms to stop allowing third-party online marketers track the internet habits of children under 13. Hasbro and Mattel are among four toy companies who have agreed to stop allowing online marketers track ...
Tags: Hasbro, Mattel, online marketers, internet habits
As a victim of cybercrime in recent years, China chooses not to suffer in silence, but actively fight cybercrime and help govern the cyber community together with the rest of the world. As host of the Second World Internet Conference ...
Tags: Cyberspace, cybercrime, e-business
A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centres in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence. The ...
Tags: bulletproof, Russian, cybercriminals, data centre, Internet
Security vendor Symantec has discovered a Linux worm called Linux.Darlloz that has been engineered to exploit a known bug in PHP (php-cgi Information Disclosure Vulnerability) that was patched last year. Vulnerable devices include unpatched ...
Tags: Computer Products, software
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
Yahoo received more than 30,000 requests from seventeen different countries around the world for user data in the first half of this year, resulting in more than 25,000 instances of data disclosure, it said Friday in its first transparency ...
Tags: Yahoo, Data Requests
The Indian government is expected to require that Indian bureaucrats use email service provided by the National Informatics Center for their official work, as it tries to secure its communications infrastructure. The requirement will be ...
Tags: Computer Products, Email
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization. The announcement came during ...
Tags: Rapid 7, software, Computer Products
Although cyberattacks caused just 6 percent of significant outages of public electronic communications networks and services in the E.U. last year, they affected more people than hardware failure, a much more common factor in service ...
Tags: Computer Products, webservice
Government requests to Twitter to reveal private information about users has rocketed by 40 per cent in the first six months of this year, the social media company has revealed as part of its bi-annual transparency report. The report, ...
Some websites and mobile app developers are confused about how to comply with revised rules governing the online collection of personal information from children that took effect in the U.S. Monday, critics said. The U.S. Federal Trade ...
Web content filtering company Netsweeper has supplied its products to Pakistan, even as some top IT companies have refused to supply gear for a controversial filtering project, a Canadian research group has disclosed. The new report ...
Tags: Netsweeper, Internet Content, Pakistan
The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa. The largest contributors to this increase are advanced ...
Distributed denial-of-service (DDoS) attacks that could be related have in the past few days slammed the DNS servers of at least three providers of domain name management and DNS hosting services. DNSimple, easyDNS and TPP Wholesale all ...
Tags: DDoS Attacks, DNS