Tablets and smartphones have become a primary tool to manage work and life as digital transformation accelerated last year. This trend is especially evident in the finance sector, where both workers and customers have become dependent on mobile devices to do everything from shopping, playing bills and managing finances. Similarly, financial employees are using the […]
Researchers from the University of London’s Royal Holloway have discovered several flaws in the MTProto protocol used by the popular encrypted messaging app Telegram techradar report. While end-to-end encryption (E2EE) is available in one-on-one chats, the MTProto protocol is used in the service’s group chats (also known as cloud chats) as well as when users don’t opt-in […]
It has been reported that the Department of Homeland Security has announced new requirements for U.S. pipeline operators to bolster cybersecurity following Colonial Pipeline ransomware attack. In a statement, DHS said it would require operators of federally designated critical pipelines to implement “specific mitigation measures” to prevent ransomware attacks and other cyber intrusions. Operators must also implement contingency plans […]
It has been reported that Northern rail’s new self-service ticket machines have been targeted by a suspected ransomware cyber-attack. The system has been offline since last week and an investigation is underway. It comes just two months after 621 of the touch-screen units were installed at 420 stations across the north of England at a cost of £17m. The government-run operator said […]
Several Western countries have accused China of hacking Microsoft Exchange, which affected at least 30,000 organisations around the world, and China has since slammed claims.
New research by Bitdefender analyst Janos Gergo Szeles examines newly documented Windows malware that’s being distributed widely across the web through cracked software and paid search ads. Researchers dubbed the strain “Mosaic” due to the “intricate internal structure that aims to confuse malware analysts and prevent reverse-engineering. An expert offers perspective.