© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

What men can do to help women enter the cybersecurity field

The skills shortage across the cybersecurity sector has been well documented, but with the computing sector generally, and cybersecurity specifically...
Read more about What men can do to help women enter the cybersecurity field

Chinese apps: alternatives to TikTok, WeChat and other popular apps

2
It's a well-known fact that China is guilty of spying over its citizens. However, its reach doesn't stop there. The...
Read more about Chinese apps: alternatives to TikTok, WeChat and other popular apps

Boomer outsmarts hackers: “Kiss your cash goodbye”

4
John Richards, the 73-year-old former technician from North Yorkshire, was able to turn the tables on hackers attempting to steal...
Read more about Boomer outsmarts hackers: “Kiss your cash goodbye”

350 million decrypted email addresses left exposed on an unsecured server

The CyberNews research team uncovered an unsecured data bucket owned by an unidentified party, containing seven gigabytes worth of unencrypted...
Read more about 350 million decrypted email addresses left exposed on an unsecured server

Beware using postal and parcel apps

As we’re ordering more online, the attack vectors for hackers become more obvious Cybercriminals know how to capitalize on changes...
Read more about Beware using postal and parcel apps

270 million malware attacks occurred between January and March

While many parts of the economy are slowing down, hacking isn’t We’ve seen an unprecedented change in the world economy...
Read more about 270 million malware attacks occurred between January and March

Cyberwarfare: which countries are targeted the most?

Bad news if you live in the United States: according to the Centre for Strategic and International Studies (CSIS), who...
Read more about Cyberwarfare: which countries are targeted the most?

Malvertising: what you need to know to prevent it

Ads can be annoying, and they can also be dangerous to your cybersecurity. Simply by visiting your favorite daily news...
Read more about Malvertising: what you need to know to prevent it

These are the top 5 malware strains to worry about in 2021

Make sure you avoid these at your peril Cybercriminals are always looking for ways to attack their victims, and are...
Read more about These are the top 5 malware strains to worry about in 2021

The cybersecurity challenges for the auto industry

Automobiles are becoming increasingly digital affairs, with developments across shared mobility, electrification, autonomous systems and connectivity all moving the sector...
Read more about The cybersecurity challenges for the auto industry

Is passwordless authentication secure?

A traditional password has long been a central component of cybersecurity. However, according to many data breaches, the most popular...
Read more about Is passwordless authentication secure?

Ransomware insurance: the costs of a clean-up

One feature of the coronavirus pandemic has been a sharp increase in the number and severity of ransomware attacks.  According...
Read more about Ransomware insurance: the costs of a clean-up

IndieFlix streaming service leaves thousands of confidential agreements, filmmaker SSNs, videos exposed on public server

In order to increase efforts to secure customer and client data, IndieFlix will be “immediately dedicating time and resources towards...
Read more about IndieFlix streaming service leaves thousands of confidential agreements, filmmaker SSNs, videos exposed on public server

Are organizations reporting cyberattacks more?

Across a few articles since the pandemic has erupted across the world, I’ve noted how cyberattacks have been on the...
Read more about Are organizations reporting cyberattacks more?

Why there are no winners in a tech cold war between China and the West

When China recently introduced its new national security law for Hong Kong, many predicted a turbulent future for tech and social media...
Read more about Why there are no winners in a tech cold war between China and the West

What is social engineering?

Social engineering is the act of manipulating people into revealing confidential information. Fraudsters may impersonate someone else or steal other...
Read more about What is social engineering?

We think it’s other people that fall for online scams

The rise in cybersecurity attacks during the coronavirus pandemic has been well documented. It’s been a perfect storm of vast...
Read more about We think it’s other people that fall for online scams

Top myths about malware, ransomware, and spyware

One of the downsides of always being connected is the constant threat of malicious software and threats that come in...
Read more about Top myths about malware, ransomware, and spyware

Critical US infrastructure can be hacked by anyone

2
Our research found that both public and private infrastructure in the US is still unprotected and easily accessible to hackers - with no passwords at all.
Read more about Critical US infrastructure can be hacked by anyone

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

CyberNews received information from reader Jake Dixon, a security researcher with Vadix Solutions, who discovered an unsecured Amazon Simple Storage...
Read more about New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data