Megaupload’s Kim Dotcom gets back some of his seized property, and receives right to see evidence against him
Kim Dotcom has won back the right to see all the evidence against him – before, rather than after, his possible extradition to the US to answer charges of racketeering, money laundering, online piracy and copyright infringement. more…Megaupload’s Kim Dotcom gets back some of his seized property, and receives right to see evidence against him
Kim Dotcom has won back the right to see all the evidence against him – before, rather than after, his possible extradition to the US to answer charges of racketeering, money laundering, online piracy and copyright infringement. more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…Assessing the impact of protection from web miners
Brief summary: We present the results of evaluating the positive economic and environmental impact of blocking web miners with Kaspersky products. The total power saving can be calculated with known accuracy using the formula <w>·N, where <w> is the average value of the increase in power consumption of the user device during web mining, and […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set to be filled with many must-see moments. For those occasions where a television isn’t close by or the content is not freely available, many of us may resort to streaming services so that we can […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…Kim Dotcom faces extradition to the US
A New Zealand court ruled on Monday that internet entrepreneur Kim Dotcom could be extradited to the United States to face charges relating to his Megaupload website, which was shut down in 2012 following an FBI-ordered raid on his Auckland mansion. The Auckland High Court upheld the decision by a lower court in 2015 on […] more…Hacktivist Group CyberBerkut Behind Attacks on German Official Websites
A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able to gather some information on some of its members based on Pastebin data that had been leaked by the Ukrainian nationalist political party (Pravy Sektor). A Background on CyberBerkut CyberBerkut is an organized group […] more…Securing the Internet of Everything
Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let me explain. When a company creates a smart device, they not only need to create the hardware for […] more…More information
- Quantum algorithms save time in the calculation of electron dynamics
- QBot Malware Infects Over 800 Corporate Users in New, Ongoing Campaign
- Hackers Can Exploit LibreOffice Flaw With RTF Files
- Albania’s Institute of Statistics Suffers Cyberattack, Some Systems Affected
- What We’ve Got Here is Failure to Communicate!
- China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign
- Chrome 126 Updates Patch High-Severity Vulnerabilities
- ITS Streaming Video Service Discontinuing on 11/06/2015
- It Took Police Three Years to Fully Shut Down a Money-Stealing Botnet
- Intel Xeon Scalable Processors CVE-2019-11139 Denial of Service Vulnerability