Source: digitaltrends.com

California passes bill that regulates security for Internet of Things devices - Cyber security news

California passes bill that regulates security for Internet of Things devices

Purchasing a used smart speaker? A hacker could be listening to you - Cyber security news

Purchasing a used smart speaker? A hacker could be listening to you

The demand for hacking tools and malware is greater than the current supply - Cyber security news

The demand for hacking tools and malware is greater than the current supply

Ortovox recalls avalanche transceivers to fix potentially risky software bug - Cyber security news

Ortovox recalls avalanche transceivers to fix potentially risky software bug

IBM banned USB drives. Is it the future of security or a knee-jerk reaction? - Cyber security news

IBM banned USB drives. Is it the future of security or a knee-jerk reaction?

Ring is promising to do better, and urges folks not to share login details - Cyber security news

Ring is promising to do better, and urges folks not to share login details

AMD says the patches for its recent Ryzen flaws are almost ready - Cyber security news

AMD says the patches for its recent Ryzen flaws are almost ready

‘PlayerUnknown’s Battlegrounds’ hacking tool developers arrested in China - Cyber security news

‘PlayerUnknown’s Battlegrounds’ hacking tool developers arrested in China

Amazon has fixed a bug that allowed hackers to listen in on Alexa devices - Cyber security news

Amazon has fixed a bug that allowed hackers to listen in on Alexa devices

Use this Rubik’s Cube-style device to create ultra-secure computer passwords - Cyber security news

Use this Rubik’s Cube-style device to create ultra-secure computer passwords

Ransomware shifts focus from holding passwords hostage to hijacking your PC - Cyber security news

Ransomware shifts focus from holding passwords hostage to hijacking your PC

From pranks to nuclear sabotage, this is the history of malware - Cyber security news

From pranks to nuclear sabotage, this is the history of malware

North Carolina police force asks Google for data from devices near crime scenes - Cyber security news

North Carolina police force asks Google for data from devices near crime scenes

Cryptojacking turns your PC into a bitcoin mine, but you won’t see a cent - Cyber security news

Cryptojacking turns your PC into a bitcoin mine, but you won’t see a cent

Thieves heist 600 PCs built for digital coin mining in Iceland - Cyber security news

Thieves heist 600 PCs built for digital coin mining in Iceland

The flu is poking holes in hospital cybersecurity, and a shot can’t save you - Cyber security news

The flu is poking holes in hospital cybersecurity, and a shot can’t save you