Amber Rudd’s Call For Whatsapp Messages To Be Available To Security Services

Following the news that Amber Rudd’s Call for Whatsapp Messages to be Available to security services. IT security experts from Avast, CipherCloud, DomainTools, AlienVault, Tenable Network Security, Tripwire, and FireMon commented below. Tony Anscombe, Ambassador and Senior Security Evangelist at Avast: “We understand why governments want to be able to access the content in these messages but, unfortunately, banning encryption in order to […]

Uber Suspends Self-Driving Car Program After Arizona Crash

News is circulating that Uber is temporarily suspending tests of its self-driving cars following a crash Friday evening in Tempe, AZ, that involved one of the company’s autonomous vehicles. The accident occurred when the driver of a second vehicle “failed to yield” to the Uber vehicle, which was in self-driving mode, while making a turn. The vehicles collided, […]

More Than A Third Of Businesses Lack A Formal Strategy Against Cyber Attack

The Institute of Directors and Barclays have released a report today about how more than a third of businesses lack a formal strategy on cyber-attacks. In the survey of 845 members of the Institute of Directors, conducted in December 2016, 95 per cent of respondents said they considered cyber security to be quite or very important to their business, […]

The Cost And Profitability Of Arranging A DDoS Attack

DDoS attack

According to Kaspersky Lab experts, the black market’s offering of DDoS services is quite high, and criminals who want to arrange such an attack find it to be quite profitable. They were also able to calculate that an attack using a cloud-based botnet of 1000 desktops is likely to cost the providers about $7 per […]

Nasty Adware Hiding In Apps On Google Play Store

The adware would like to be your device administrator if you let it In our ongoing hunt for malicious apps on Google Play Store, we have come across more than a dozen apps that we have confirmed to be aggressive adware strains, with the ability to add themselves as device administrator on a victim’s mobile device. After a primary […]