Computer Security

The Phish Scale: New Tool Helps It Staff See Why Users Click On Fraudulent Emails

Researcher have developed a new tool called the Phish Scale that could help organizations better train their employees to avoid a particularly dangerous form of cyber attack known as phishing.

Read More →

Does Your Cloud Server Need A Firewall?

A firewall is a network utility that runs on your server and prevents outsiders from using certain ports. This makes it a useful security tool for blocking attackers from accessing processes they shouldn’t. Does your server need one?Read This...
Related topics: Servers

Read More →

Us Homeland Security Warns About Critical Flaw In Windows Servers

It’s not really rare to hear news about one Windows vulnerability or another ranging from the trivial to the critical. There are only a few times, however, when the DHS, best known as the US Department of Homeland Security, speaks about it....
Related topics: Servers

Read More →

Iranian Hackers' Android Malware Spies On Dissidents By Stealing 2fa Codes

It’s no secret that some countries have spied on their citizens through innocuous-looking apps, but one effort is more extensive than usual. Check Point Research has discovered (via ZDNet) that Rampant Kitten, an Iranian hacker group that has...
Related topics: Hackers, Android, Android Apps, Mobile Technology, Malware

Read More →

Lego's Mario Figurine Is The Only Nes Controller That I Care About

LEGO’s Super Mario building sets let you craft your own real-world levels, with complex terrain, coins, enemies, and an intelligent Mario figurine. Now, a hacker named Rick (@r1ckp) is using the LEGO Mario figurine as a Super Mario Bros...
Related topics: Hackers

Read More →

Code For Hackers

Mike and I were talking about two very similar clock projects we’d both built recently: they both use ESP8266 modules to get the time over WiFi and NTP, and they both failed. Mike’s failed because he was visiting relatives in a different...
Related topics: Hackers

Read More →

Lilbits: A New Mobile, Open Hardware Device

The hardware hacker who brought us the Novena open laptop, the NeTV2 open video development board, and the Chumby, is preparing to launch a crowdfunding campaign for a new open hardware device called Precursor. The goal is to provide a handheld...
Related topics: Hackers, Laptops, Tech Videos, Crowdfunding

Read More →

Your Anti-phishing Test Emails May Be Too Easy To Spot. Nist Has A Training Tool For That

Phish Scale hopes to make life easier for blue teams gazing at click rates The US National Institute of Standards and Technology (NIST) has said it has developed a way of measuring precisely why corporate staff click on obvious phishing emails and...

Read More →

Feeling Bad About Your Last Security Audit? Check Out What Just Happened To The Us Department Of...

It starts with a backpack of $200 of electronics and poor Wi-Fi security The US Department of the Interior (DoI) spectacularly failed its latest computer security assessment, mostly for a lack of Wi-Fi defenses.…

Read More →

Apple Now Sees Unreal Engine As A Potential Second Trojan Horse

The drama between Apple and Epic Games has not yet subsided as the two await their day in court. Epic Games is still pushing for an injunction that will allow Fortnite to return to iOS, including the new direct payment option that started this whole...
Related topics: Apple, Unreal Engine, Trojan Horses, Ios

Read More →

You Have To Be Very On-trend As A Cybercrook – Hence Why Coronavirus-themed Phishing Is This...

F-Secure gives its take on the first half of 2020 in internet scumminess Coronavirus-themed malicious emails were the standout feature of online naughtiness in the first half of 2020, according to infosec firm F-Secure – though overall volumes of...

Read More →

Worried About Bootkits, Rootkits, Uefi Nasties? Have You Tried Turning On Secure Boot, Asks The No...

And have you tried simply asking hackers to not hack? The NSA has published online a guide for IT admins to keep systems free of bootkits and rootkits.…
Related topics: Hackers, NSA

Read More →

Cybercriminals Have Infected 'practically All' Porn Sites With Malicious Malware, Says Security Firm

Hackers initially targeted mid-range adult film portals, but recently hit a jackpot by placing ads on xHamster, one of the largest porn websites, with one billion visitors per month. The majority of victims were in the United States.
Related topics: Malware, Hackers

Read More →

Russian Hacker Selling How-to Vid On Exploiting Unsupported Magento Installations To Skim Credit...

Nearly 2,000 e-commerce shops pwned over weekend so it's time to migrate Thousands of e-commerce stores built using Magento 1 have been poisoned with malicious code that steals customers' bank card information as they enter their details to order...
Related topics: Hackers, Credit Cards

Read More →

Is Little Timmy Still Enthralled By His Leapfrog Tablet? Maybe Check He Hasn't Sideloaded An...

Android hackers prove it can be done, but it was no mean feat A group of Android tinkerers have found a way of sideloading an unrestricted OS onto the LeapFrog Epic, a kid-friendly tablet.…
Related topics: Tablets, Android, Mobile Technology, Hackers

Read More →

What Do F5, Citrix, Pulse Secure All Have In Common? China Exploiting Their Flaws To Hack Govt, Biz...

Beijing's snoops don't even need zero-days to break into valuable networks The US government says the Chinese government's hackers are preying on a host of high-profile security holes in enterprise IT equipment to infiltrate Uncle Sam's agencies and...
Related topics: Hackers

Read More →

New Windows Exploit Lets You Instantly Become Admin. Have You Patched?

Enlarge (credit: VGrigas (WMF)) Researchers have developed and published a proof-of-concept exploit for a recently patched Windows vulnerability that can allow access to an organization’s crown jewels—the Active Directory domain controllers...

Read More →

Daily Deal: The Complete 2020 Learn Linux Bundle

The Complete 2020 Learn Linux Bundle has 12 courses to help you learn Linux OS concepts and processes. You'll start with an introduction to Linux and progress to more advanced topics like shell scripting, data encryption, supporting virtual...
Related topics: Linux

Read More →

Another Month, Another Cryptocurrency Exchange Hacked And 'millions Of Dollars' Stolen By Miscreants

Plus get patching your Palo Alto kit, there's a nasty crit out there In brief  Cryptocurrency exchange Eterbase last week admitted hackers broke into its computers and made off with other people's coins, said to be worth $5.4m.…
Related topics: Hackers

Read More →

Autonomous Multi-task Performing Robot

[Ruchir] has been pretty into robotics for a while now and has always been amused by the ever-popular obstacle avoiding robot, but wanted something that could do more. So, like any good hacker, he decided to build something himself. He wanted to...
Related topics: Robots, Hackers

Read More →
What is noozilla?
Noozilla is an independent news aggregation service with a categorization engine that categorizes millions of news stories by subject.