© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

New MIT tool can trick natural-language-processing systems

Growing up, the concept of a digital assistant was dominated by HAL, arguably the lead character in Stanley Kubrick's sci-fi...
Read more about New MIT tool can trick natural-language-processing systems

Busting myths around bug bounty platforms

Cybersecurity attacks continue to rise not only in numbers but in sophistication and complexity. A data breach that violates GDPR...
Read more about Busting myths around bug bounty platforms

5G conspiracy theories show the nefarious power of social media

1
Social media has been a shot in the arm for information distribution. Whether you’re looking to spread awareness of the...
Read more about 5G conspiracy theories show the nefarious power of social media

Improving your cyber hygiene during the coronavirus pandemic

Back in December, self-proclaimed futurists bombarded our news feeds with predictions for the year ahead. But Q1 set the tone...
Read more about Improving your cyber hygiene during the coronavirus pandemic

The growing threat of adversarial attacks

Recently I attended the launch of Dark Data, the latest book by Imperial College’s emeritus professor of mathematics, David Hand,...
Read more about The growing threat of adversarial attacks

Marketing giant Maropost exposes 95 million email records and doesn't seem to care about it

1
The CyberNews research team discovered an exposed database belonging to Maropost, containing 95 million user email addresses, as well as client email logs.
Read more about Marketing giant Maropost exposes 95 million email records and doesn't seem to care about it

We uncovered a secret network of 27 app developers in the Google Play store

27
Update May 22: Updated to include the results of analysis of 2NAD apps by mobile security firm Pradeo. Update April...
Read more about We uncovered a secret network of 27 app developers in the Google Play store

Safeguarding utilities from cyberattack

The risks associated with cyberattacks on key infrastructure are increasingly appreciated, and the scale of the challenge was emphasized by...
Read more about Safeguarding utilities from cyberattack

Domain names are a risk for coronavirus-themed phishing attacks

The coronavirus battleground is shifting to your web browser, as the market for domain names themed to covid-19 hot up...
Read more about Domain names are a risk for coronavirus-themed phishing attacks

The world of business is finally doing cybersecurity right

Almost every news story you read features scary tales of corruption, incompetence, and even disaster. In a world of 24-hour...
Read more about The world of business is finally doing cybersecurity right

The sophisticated business strategies of the modern cybercriminal

The common perception of the modern hacker is a lone wolf operating out of their basement, but the reality could...
Read more about The sophisticated business strategies of the modern cybercriminal

Protecting you and your business from the hidden risks of remote working

Only a few months ago, technologists and futurists gazed into their virtual crystal balls to predict what we can expect...
Read more about Protecting you and your business from the hidden risks of remote working

Report: unidentified database exposes 200 million Americans

4
The CyberNews research team uncovered an unsecured database that contained contained more than 200 million detailed user records, putting an astonishing number of people at risk.
Read more about Report: unidentified database exposes 200 million Americans

Mapping the consequences of cyber-physical attacks

At the start of this year, the World Economic Forum (WEF) published their annual Global Risks Report, and while there...
Read more about Mapping the consequences of cyber-physical attacks

Corporates face ransomware threat as coronavirus phishing campaigns spread

If there's one group of people rubbing their hands with glee, rather than sanitiser, it's cybercriminals. With people desperate for...
Read more about Corporates face ransomware threat as coronavirus phishing campaigns spread

How disinformation and data-driven propaganda is making citizens vulnerable

The arrival of the internet allowed users from all over the world to think beyond their geographical borders. Together they...
Read more about How disinformation and data-driven propaganda is making citizens vulnerable

Accenture research highlights the slow pace of progress on cybersecurity

Stories of cyber attacks on corporations and their leaders are becoming all too commonplace, but Accenture’s third State of Cyber...
Read more about Accenture research highlights the slow pace of progress on cybersecurity

To thwart cyberattacks, we need to think like hackers

1
A common Hollywood trope is the use of ex-convicts to help catch a criminal mastermind that has confounded the very...
Read more about To thwart cyberattacks, we need to think like hackers

Popular dating app leak puts millions of women at risk

3
During our research into dating apps, we’ve discovered that it is possible to track OkCupid users and find their exact location.
Read more about Popular dating app leak puts millions of women at risk

Network Rail data leak highlights free wifi risk

A security researcher has discovered a vulnerability that left the personal data of 10,000 UK rail passengers exposed. C3UK provides...
Read more about Network Rail data leak highlights free wifi risk