Bitcoin – Understanding runaway markets

Understanding runaway markets Werner van Rooyen • 7 minute read As Bitcoin and Ethereum continue their record-breaking run over the past few weeks, we’d like to take a moment during this euphoria to explain the dynamics of runaway markets and how to protect yourself against transactions you might come to regret. Investment decisions don’t start with deposits or purchases, they should start with education. The […]

AI, VR and IoT to Robotics, Tech Has Lots in Store in 2018!

Each year around this time, we do our best to peer into the future and make predictions about those things that will drive us, fuel innovation, and set the tech world aflame in the coming year. The rapid pace of innovation, however, makes predicting what’s to come in tech pretty tricky (not to mention pretty exciting)! Not so long ago — though it sometimes feels […]

Massive data leak could be from a credit bureau

Johannesburg – The sensitive private information of 30 million South Africans, contained in a massive data breach, appears to have been hacked from a credit bureau. This is according to Australian Microsoft regional director, Tory Hunt, who exposed the leak on Twitter on Tuesday. READ: Millions of South Africans’ personal information may have been leaked online Hunt is also a security researcher and creator of […]

CCleaner attack on millions of computers sought out telecom firms, app’s owner says

SAN FRANCISCO — Hackers that broke into as many as 2.27 million accounts of a computer cleaning program were targeting telecom equipment companies in the United States, Japan, South Korea and Taiwan, security company Avast told USA TODAY Thursday. The initial breach was reported on Tuesday. Hackers had hidden malware in CCleaner, a popular app that cleans cookies and junk programs from PCs and Android phones to make them […]

Widespread, Brute-Force, Cloud-to-Cloud Attacks Hit Office 365 Users

An operationalized cloud-to-cloud brute-force attack against Microsoft Office 365 users has hit high-level employees at multiple Fortune 2,000 organizations. According to Skyhigh Networks, which remediated the attack, the perpetrators used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts. The campaign had a “slow-and-low” pattern of coordinated attacks on high-value targets, including more than 100,000 failed Office 365 […]

Ransomware: The race you don’t want to lose

In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate.  The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security technologies implemented and optimized properly are certainly one piece of the puzzle, however […]

Petya cyber attack: What’s going on with the latest ransomware virus? – ABC News (Australian Broadcasting Corporation)

Petya cyber attack: What’s going on with the latest ransomware virus? By Jessica Haynes A massive ransomware attack has hit computers and servers across the globe causing turmoil in its path. Could you be affected? Here’s what we know so far. How did it start? The attack first shut down operations in Russia — including at Russia’s biggest oil company — and Ukraine before spreading […]

News and sports websites ‘vulnerable to attack’ – BBC News

News and sports websites have some of the lowest levels of security adoption, a study has suggested. A team of cyber-security experts looked at the security protocols used by the top 500 sites in various industries and online sectors. They found that fewer than 10% of news and sports websites used basic security protocols such as HTTPS and TLS. Even those that do are not […]

Open Source Survey Exposes Community Troubles | Community | TechNewsWorld

Open Source Survey Exposes Community Troubles GitHub this week released the results of its survey on open source software development, practices and worldwide communities. GitHub partnered with researchers from academic institutions, industry organizations and the open source community to collect responses from more than 6,000 participants. The results show the importance of open source documentation and reveal some of the problems missing or poorly done […]

Tech Tent: fake news, algorithms and listening gadgets – BBC News

    In an era of fake news and alternative facts, how can scientists re-engage with the public and make sure they are respected and understood? That’s a big theme at the Cheltenham Science Festival from which this week’s edition of Tech Tent comes. We also discuss the growing importance of algorithms in our lives – and ask whether we should be worried that our […]