The Register

Biting the hand that feeds IT — Enterprise Technology News and Analysis
  1. And added a bug bounty program to detect any holes in its 'youth mode'

    Douyin, the Chinese app known as TikTok outside the Middle Kingdom, has imposed limits on usage time for kids.…

  2. Once dismissed proof-of-concept attack on Microsoft OS through WSL detected in the wild

    Linux binaries have been found trying to take over Windows systems in what appears to be the first publicly identified malware to utilize Microsoft's Windows Subsystem for Linux (WSL) to install unwelcome payloads.…

  3. Tells clients it is tackling the issue

    An IT recruitment agency says a "phishing scam" is behind a fake email sent to its customers with details on how to apply for a "Coronavirus Digital Passport."…

  4. Not always, but Swiss team says you can manage the risks

    There's a fine line between getting hold of data that may be in the public interest and downright stealing data just because you can. And simply because the data is out there – having been stolen by online intruders and then leaked – does not mean it is right to use it.…

  5. Clouds usually fix this sort of thing before bugs go public. This time it's best to assume you need to do this yourself

    Microsoft Azure users running Linux VMs in the IT giant's Azure cloud need to take action to protect themselves against the four "OMIGOD" bugs in the Open Management Infrastructure (OMI) framework, because Microsoft hasn't raced to do it for them.…

  6. Not all promises of international flight itineraries are real, warns Cisco Talos

    A phishing campaign that mostly targeted the global aviation industry may be connected to Nigeria, according to Cisco Talos.…

  7. Breach and attack simulation tools help you raise your game, Keysight says

    Sponsored  Stop me if you’ve heard this before, but something appears to be amiss with cybersecurity. The spectacular success of ransomware is only the latest and worst example, a phenomenon in which small groups of often barely technically literate attackers ransack some of the biggest and best resourced companies on earth for easy money.…

  8. You tell 'em, 4 New Square chambers

    The London law firm which secured a court injunction forbidding ransomware criminals from publishing data stolen from them has now gone a step further – by securing a default judgment from the High Court.…

  9. Translation: Skills shortage here!

    DSEI 2021  Military computer scientists ought to be treated with the same regard as pilots and warship captains, the head of the Army's cyber command has said.…

  10. Jeffrey Singh, stamp-collecting bachelor (35) of Milwaukee, Wisconsin – is that you?

    Feature  Publishing data of all kinds offers big benefits for government, academic, and business users. Regulators demand that we make that data anonymous to deliver its benefits while protecting personal privacy. But what happens when people read between the lines?…

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form