His lawyer claims that the teen did the hacking because he admired Apple and dreamed of landing a job in the company. A 16-year-old Australian teenager has broken into Apple’s internal systems multiple times, making off with 90GB of “secure files” and accessing customer accounts in the process, according to The Age, which cited court proceedings. … More Australian schoolboy hacks into Apple’s network, steals files
The newly-released report provides an overview of the data breach landscape in the first half of this year. The first half of 2018 saw 2,308 publicly disclosed data breaches that resulted in the exposure of approximately 2.6 billion user records, a report from cyberthreat intelligence company Risk Based Security has shown. This represents a drop from … More Some 2.6 billion data records exposed in first half of 2018
If you’re an Instagrammer, you may want to take some basic precautions, such as picking a strong and unique password and signing up for two-factor authentication sooner rather than later. Hundreds of Instagram users are reportedly experiencing an apparently coordinated hack, leaving them with their accounts hijacked and personal information altered – all the while … More Instagram users locked out of accounts en masse
Heralded as the answer to many cybersecurity issues, machine learning hasn’t always delivered. Over the past several years there was no such thing as a security vendor that didn’t have machine learning (ML) – usually mischaracterized it as artificial intelligence (AI) because bandwagons are so attractive, no matter how misleading – and they mostly claimed it was … More AI was supposed to fix security – what happened?
Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Aiming to protect critical infrastructure against attacks. Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are horribly insecure, there is … More Black Hat: Protecting Industrial Control System
Today, we continue with our series of conversations with ESET’s security pros to hear what they have to say about the evolution of the World Wide Web since it was publicly announced 27 years ago. Next to weigh in from our lineup of experts is ESET Security Researcher Cameron Camp, who shares his thoughts mainly about … More Interviewing ESET’s experts about the Web’s journey so far – part 2