Apple has released updates for its iOS and macOS operating systems, patching a series of critical security vulnerabilities along with other bugs. Here's what you need to know.
Data is what makes the world go round, so it’s no wonder why we’re all so interested in keeping it safe and secure. As a result, the demand for cybersecurity experts has never been higher, and becoming one is easier than you think. Pick up the White Hat Hacker 2017 Bundle, and you can kickstart your foray into this high-paying field—all for a price you get to pick.
Just as Meitu, the insanely popular mobile app that 'anime-fies' your face, has gone viral in the Western world, so has security and privacy concerns over the amount of data it collects on its users. Some security researchers have noted that, for a frivolous photo editing app, it's asking for way too many permissions to access information on a user's phone. The app is also apparently sending data about its users to remote servers in China. Here's what you need to know.
In the past, we've talked about ProtonMail, a free and open source email service that lets you send and receive encrypted emails easily. Now the service is adding an extra layer of security by opening up an option for users to access their inbox through the Tor network. Here's what you have to know.
In December last year, Yahoo admitted that over one billion user accounts were hacked. It looks like thousands of Australian government officials were among the users that had their Yahoo email addresses, passwords and other personal information stolen.
There are several cities across Australia that are currently running or trialling publicly accessible Wi-Fi networks. Most recently, the NSW Government has announced it will be running a sponsored trial of free Wi-Fi on selected public buses across the city. But just because the government is backing the free service doesn't mean it's safe. There are still privacy and data security issues you need to consider if you're going to use any public Wi-Fi network.
Last week, Yahoo revealed it had been hacked and information on one billion user accounts had been stolen. It appears that the hackers had put the database up for sale and it has fetched a handsome sum of money.
Stolen Yahoo account information includes hashed passwords and personal information.
This new Yahoo data breach is separate to the state-sponsored hack the company reported back in September where 500 million user accounts were compromised. Read on to find out more.
We've heard about ransomware that operates as a franchise. Now there's a ransomware that runs a referral program; infect two other people and you'll get to unlock your files for free. Here's the million-dollar question: Would you do it?
Various models of Netgear routers have been found to have a critical security flaw that lets hackers take over the devices and remotely run code on them. The vulnerability is easy to exploit and the list of affected Netgear routers is growing. Here's are all the Netgear routers that have been found to carry the security bug and a possible workaround.
Passwords are the go-to for protecting our online accounts, but they’re not exactly reliable or convenient—especially when you have 20 of them to remember. Fortunately, there’s an easier way to manage your online security, and its name is True Key.
When you enter your password online, the companies behind reputable websites will do a number of things in the background to ensure it is protected. These include hashing the password, using salted hashes and inefficient mathematical algorithms so that even if hackers do get your password data, it will be extremely difficult for them to crack it. But how do these security techniques work? Let's find out.
Hundreds of millions of users had their online accounts compromised last year, which means surfing with a VPN is more essential than ever. And when it comes to choosing one, you can’t go wrong with HotSpot Shield — especially now that it’s rolling out its new Elite Plus plan. Now, you can enjoy top-tier online protection on up to 10 concurrent devices.