Apple will reportedly open its first ever Chinese data center in order to comply with China's new controversial and stringent cybersecurity laws. The tech giant's new data center is set to be located in the south-western Guizhou province and will be operated in partnership with a local data management firm called Guizhou-Cloud Big Data Industry Co Ltd
CS Digest Section: Data Security
A black market hacking tool has the potential to rapidly conduct website scans for SQL injection vulnerabilities at a large scale, all managed from a smartphone through the Telegram messenger. The Katyusha Scanner is a relative newcomer available to black hats that surfaced in early April. It's a blend of the Arachni Scanner open source penetration testing
Verizon, the major telecommunications provider, has suffered a data security breach with over 14 million US customers' personal details exposed on the Internet after NICE Systems, a third-party vendor, mistakenly left the sensitive users’ details open on a server.
Global shipping is still feeling the effects of a cyber attack that hit A.P. Moller-Maersk two days ago, showing the scale of the damage a computer virus can unleash on the technology dependent and inter-connected industry.
In the wake of recent devastating global ransomware outbreaks, Microsoft has finally realized that its Windows operating system is deadly vulnerable to ransomware and other emerging threats that specifically targets its platform. To tackle this serious issue, the tech giant has introduced a new anti-ransomware feature in its latest Windows 10 Insider P
The Defense Information Systems Agency (DISA), which manages the Pentagon’s email systems, says it intends to adopt, by default, STARTTLS, an encryption protocol designed to prevent the interception of email messages in transit. "DISA is actively working an acquisition to upgrade the email gateways that will allow us to take advantage of evolving c
Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems - including Linux, OpenBSD, NetBSD, FreeBSD and Solaris - which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover.
Good news: Exploits kits remain in decline, thanks in large part to concerted efforts to disrupt their efficacy. Unfortunately, criminals are focusing instead on social engineering attacks - including tech-support scams - and malicious spam campaigns as malware distribution mechanisms, as noted by Brad Duncan, a threat intelligence analyst for the Unit 42
Researchers at Fox‑IT have managed to wirelessly extract secret AES-256 encryption keys from a distance of one metre (3.3 feet) – using €200 (~US$224) worth of parts obtained from a standard electronics store – just by measuring electromagnetic radiation. At that distance sniffing the keys over the air took five minutes, but if an attacker got within 30 centi
Detailed voter profiles of 198 million voters were left exposed on an Amazon S3 account by Republican Party-affiliated data broker Deep Root Analytics. The discovery was made by Chris Vickery, cyber risk analyst at security firm UpGuard.