Earlier this week, the NHS suffered a widespread and crippling cyberattack that put important data at risk. We take a look at ‘WanaCrypt0r 2.0’, the ransomware software behind the attack. What is ransomware? The first thing ...
Tags: ransomware, WannaCry
If you're sick of hearing how beautiful and fabulous the Samsung Galaxy S8 is, look away now. Samsung is going to pre-install the smartphone with McAfee's security software to turn it into a virus-rocking powerhouse. McAfee today ...
Tags: Galaxy S8, Samsung, smartphone
We regularly scour Kickstarter, Indiegogo, and more to find the best crowdfunding projects around, so you know which to consider backing – and which to avoid. Our latest pick is the ZX Spectrum Next, a new take on the retro computer ...
Tags: ZX Spectrum, Apple Watch
Global Technology MapShu Shu Shu information science innovation frontier2016 is about to end, for most people, this is a busy and valuable year, but for some companies, 2016 is not good. Today, take a look at the foreign media Marshable ...
Tags: Marshable summary, hot spot
As Iceland prepares to go to the polls for its Parliamentary elections on Saturday, a radical pirate party, made up of hackers and activists, is ahead in the polls. The country's once-fringe Pirate Party is led by a former WikiLeaks ...
Microsoft has hit back at Google after the search engine giant unveiled a “critical vulnerability” in Windows. On October 21, Google warned Microsoft privately about a major security flaw in Windows that was already being ...
Infineon Technologies and Argus have enhanced the security of the connected and automated car and presented a cyber security solution for Central Gateway protection. Real-time cyber security is key for the connected and automated car. As ...
Tags: Infineon, Connected Cars
Called Toy Hackers, the show will be hosted by video blogger Simone Giertz who has risen to online fame by building and testing various robots. GoldieBlox has launched a new YouTube series designed to teach kids how to customise their own ...
Damon McCoy, an assistant professor of computer science and engineering at the NYU Tandon School of Engineering, and a group of students at George Mason University found vulnerabilities in MirrorLink, a system of rules that allow vehicles ...
The FBI and US National Highway Traffic Safety Administration (NHTSA) have warned that motor vehicles are “increasingly vulnerable" to cyber attacks. The warning comes in the wake of a demonstration by researchers that showed how a ...
Tags: FBI, NHTSA, Motor vehicles, Recall
Samsung has announced new security software for its 2016 line-up of Smart TVs running on the Tizen operating system. The new GAIA platform is described as a “powerful and comprehensive three-layer security solution.” ...
Tags: Samsung, New Security Tech, Smart TVs
Star Wars was not the only force making a come-back in 2015. The return of generic advertising brought with it a promise of increased profitability for the diamond trade. Even as numerous stories reflecting pain in the industry vied for our ...
As a victim of cybercrime in recent years, China chooses not to suffer in silence, but actively fight cybercrime and help govern the cyber community together with the rest of the world. As host of the Second World Internet Conference ...
Tags: Cyberspace, cybercrime, e-business
The movie We Are Young, We Are Strong is among the 14 titles screened at the Festival of German Cinema in China. [Photo provided to China Daily] When you speak of Germany, most Chinese probably think of beer and soccer, but an ongoing ...
Tags: movie, German Cinema, German History
TowerSec has the system to address automotive cyber security threats and is running projects with automakers and suppliers that integrate its ECUSHIELD software technology into vehicles. A just-released Wired article by Andy Greenberg ...
Tags: automobile manufacture, TowerSec, auto parts, auto system, vehcile safety