Security News > 2018 > April

From Bangkok to Phuket, they cry out: Oh, Bucket! Thai mobile operator spills 46k people's data
2018-04-13 11:15

S3 spillage spoils included driving licences and passports TrueMove H, the biggest 4G mobile operator in Thailand, has suffered a data breach.…

Absolute debuts GDPR data risk assessment
2018-04-13 11:00

Absolute announced new GDPR Data Risk and Endpoint Readiness Assessments to accelerate compliance with the impending General Data Protection Regulation (GDPR). These comprehensive assessments...

Illumio and Qualys integrate to deliver vulnerability-based micro-segmentation
2018-04-13 10:45

Illumio announced new global vulnerability mapping capabilities on its Adaptive Security Platform. Vulnerability and threat data from the Qualys Cloud Platform is integrated with Illumio...

U.K. Launched Major Cyberattack on Islamic State: Spy Chief
2018-04-13 10:23

The head of Britain’s Government Communications Headquarters (GCHQ) revealed this week that the U.K. has launched a major cyberattack on the Islamic State (IS) group, significantly disrupting its...

Cloudflare promises to tend not two, but 65,535 ports in a storm
2018-04-13 00:27

But no Daily Stormer please Cloudflare made its name proxying traffic for web servers, on network ports 80 (HTTP) and 443 (HTTPS), as a defense against denial of service attacks and their ilk.…

When SecureRandom()... isn't: JavaScript fingered for poking cash-spilling holes in Bitcoin wallets
2018-04-12 23:57

If you've got an old money store, check it for hacked gaps Concerns about a flawed crypto library that could allow Bitcoin theft have been revived following a post to a Bitcoin mailing list last week.…

Understand the GDPR guidelines for obtaining lawful consent to process data
2018-04-12 21:01

The acquisition of clear and express consent to process personal data under the GDPR will be a priority for all organizations starting May 25, 2018. Here are some simple guidelines.

'Well intentioned lawmakers could stifle IoT innovation', warns bug bounty pioneer
2018-04-12 20:51

The pushback against regulation starts here IoT security regulations could stifle innovation without addressing the security problems at hand, a well-respected security researcher controversially argues.…

Hacker Can Steal Data from Air-Gapped Computers through Power Lines
2018-04-12 20:40

Do you think it is possible to extract data from a computer using its power cables? If no, then you should definitely read about this technique. Researchers from Israel's Ben Gurion University of...

Hot Topics at the 2018 RSA Conference
2018-04-12 20:40

Regulations and New Technologies Are in the SpotlightGDPR compliance. New uses for blockchain. IoT security. These are some of the hottest topics on tap at the 2018 RSA Conference, taking place...