A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
It’s not new news. IoT devices are vulnerable to attack.
Since October, millions of internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install other forms of malware, according to security firm ESET.
A report by the internet advisory group BITAG on Tuesday identified common security problems in home IoT products and recommended steps vendors should take from now on.
Researchers have devised a new malware attack against industrial programmable logic controllers (PLCs) that takes advantage of architectural shortcomings in microprocessors and bypasses current detection mechanisms.
A U.S. banking regulator says an employee downloaded a large amount of data from its computer system a week before he retired and is now unable to locate the thumb drives he stored it on.
While many of the recent breaches like LinkedIn and Twitter have focused on the impact on consumers, rather than businesses, it doesn’t mean that companies can’t be the target, whether large or small. The reality: any data is valuable on the black market, and hackers are just itching to get their hands on yours. As a CEO, owner, or IT Manager at a company, you have a lot more at stake than just one consumer – so are you doing everything you can to protect the company from an attack?
The FBI’s refusal to reveal how it accessed an iPhone 5c from the San Bernardino shooter will face scrutiny in court. USA Today’s parent company and two other news group have filed a lawsuit against the agency, demanding it turn over the details.
The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.
Latest News Articles
- Malicious online ads expose millions to possible hack
- How to make home IoT more secure: Assume the worst
- Researchers build undetectable rootkit for programmable logic controllers
- Lost thumb drives bedevil US banking agency
- FBI faces lawsuit because it's stayed mum on iPhone 5c hack
Most Popular Articles
- 1 Android device updates: the Galaxy S7 and S7 Edge are finally getting Nougat
- 2 Sensitive access tokens and keys found in hundreds of Android apps
- 3 Here's how much Tesla will require EV owners to pay to charge up
- 4 PCWorld's January Digital Edition: How AMD's Ryzen chip could change everything
- 5 AI should enhance, not replace, humans, say CEOs of IBM and Microsoft
Join the PC World New Zealand newsletter!
- Old foes call a truce as Google and Microsoft reach patent agreement
- BlackBerry unveils first security-focused Android smartphone
- Lumia 640: Nothing budget about Microsoft’s latest handset
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?