Notebookcheck Logo

Cyberlaw

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
, , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Search
Search by article title: 
additional restrictions: Cyberlaw
UK Parliament was forced to restrict access to their email accounts due to sustained cyber-attacks today. (Source: Justin Tallis/AFP/Getty Images)

UK parliament suffering from sustained cyber-attacks

Parliament's email system has been forced to close itself off from outside connections following a series of persistent cyber-attacks discovered today.
Douglas Black, 24 Jun 2017 20:58
Image source: Microsoft

Windows 10 S can be infected with malware

While Microsoft has claimed that Windows 10 S is not vulnerable to any currently known malware, a clever cybersecurity professional has found an exploit in Microsoft Word that can run malicious code in the operating system.
Sam Medley, 24 Jun 2017 00:57
Google looks to take a harder stance against policy violators and online terrorists. (Source: Google)

Google takes a hard line on online terror in its new 4-step plan

In a recent blog post, General Counsel at Google Ken Walker delineated the company's mission to combat terrorism online. While Google already devotes a portion of its enormous resources toward counter-terrorism, the company aims to bolster its efforts with a newly published 4-step plan.
Sebastian Eifrid, 20 Jun 2017 00:00
WannaCry is estimated to have extracted US$126,000 in Bitcoin from victims. (Source: Gillian Hann/Twitter)

British intelligence claims North Korea is behind WannaCry, though doubts persist

US and British intelligence services believe that they tracked the WannaCry ransomware to North Korea via attributing it to the Lazarus Group, who hacked Sony Pictures in 2014 preceding the release of the comedy film "The Interview".
Douglas Black, 19 Jun 2017 06:22
Maybe we can trade Ajit Pai for Canada's Jean-Pierre Blais? Just a thought... (Source: Huffington Post)

Canada will soon require all smartphones to be sold unlocked

In the US, carriers have to unlock your phone once you've paid it off. But a recent Canadian ruling goes one step further: upon request, your device must be unlocked, for free, regardless of contract state. Furthermore, all new phones must be sold unlocked starting in December.
John Garcia, 15 Jun 2017 20:03
Google Drive becomes Google Backup and Sync and will release on June 28th. (Source: Google)

Google Drive will become Google Backup and Sync, will be able to back up more files

Google Drive will soon become Google Backup and Sync, which will start backing up your selected files not just from your Google Drive folder, but from almost anywhere on your computer.
Douglas Black, 15 Jun 2017 08:30
Most apps send out some level of personal data to third parties. (Source: TechRadar)

Study reveals 70 percent of mobile app data is being shared with third parties

A recent study by a Spanish institute has just revealed that the majority of mobile apps used share data with third parties.
Vaidyanathan Subramaniam, 12 Jun 2017 17:02
Apple is on-track to open 40 Apple retail stores in China by this October. (Source: TechCrunch)

Chinese officials uncover massive data theft by local Apple employees

An underground identity-theft ring where Apple employees were selling customers' personal data was uncovered in China.
Douglas Black, 08 Jun 2017 11:15
Source: Android Police

Andy Rubin's Essential brand accused of trademark infringement

Spigen, a smartphone manufacturer that owns trademark rights to the term "Essential," has sent a Cease and Desist order to Andy Rubin's Essential company. Claiming that Essential infringed on their copyright, Spigen demanded that Essential stop using the trademark.
Sam Medley, 04 Jun 2017 22:54
The Malware, developed by a Chinese digital marketing company, hijacks the victim's browser and can then steal their private information or install additional malware. (Source: Check Point Threat Intelligence)

Chinese "Fireball" malware infects almost 250 million computers

Chinese company Rafotech has been found to be responsible for the current epidemic of the "Fireball" malware, which has affected nearly 250 million computers worldwide. Fireball is usually installed by piggybacking on an installer of wanted software; it then hijacks the user's browser and can then proceed to do anything from spying to dropping additional malware.
Hassan Arshad Chattha, 04 Jun 2017 06:34
Lithium battery catches fire aboard flight to San Francisco (Source: CNN)

Lithium-ion battery catches fire aboard flight to San Francisco

A single faulty AA battery belonging to a passenger was responsible for an emergency landing two hours into the cross-country flight.
Allen Ngo, 01 Jun 2017 02:45
A recently confirmed Android exploit can seize control of your device. (Image source: goh4x.blogspot.com)

"Cloak and Dagger" vulnerability can leave your Android phone open to attack

The exploit, which has long been theorized, was confirmed by computer security researchers. By using invisible overlays and some clever social engineering, hackers can quickly gain full control to an Android device.
Sam Medley, 27 May 2017 03:34
The unassuming intrusion method has made this attack one of the most widespread in recent history. (Source: Check Point)

Vulnerability found in subtitle system of VLC, Kodi, and other media players

By injection malicious code into subtitle files, hackers are able to take full control of a device that loads the malicious subtitles. The exploit affects four of the biggest media streaming services: VLC, Kodi, Popcorn Time, and Strem.io.
Sam Medley, 26 May 2017 21:00
Say goodbye to Messenger "Days", games, and poor performance by using Messenger Lite. (Source: Facebook)

If you're tired of Facebook Messenger's bloat, try Messenger Lite

Facebook's ubiquitous chatting app, Messenger, has become so bloated that Facebook has already spun off a version for developing markets called "Messenger Lite". To install it in most countries, however, you'll have to sideload it on your Android phone.
Douglas Black, 23 May 2017 14:20
One metric for assessing the validity of a threat is its specificity. (Source: The Guardian)

Leaked internal Facebook censorship guidelines fuels concern about ethics

Internal documents from Facebook revealed to the Guardian show the difficulties the company is facing to police its 2-billion-strong membership.
Douglas Black, 22 May 2017 13:43
US may extend laptop ban to incoming flights from Europe (Image: regmedia.co.uk)

US may extend laptop ban to more incoming flights from Europe

Flying to the United States from Europe? You may soon be forced to check in your laptop and tablet for safety.
Allen Ngo, 12 May 2017 04:12
Game console emulators like Nesbox will no longer be available on the Windows Store. (Source: Nesbox)

The Windows Store has officially banned emulators

Microsoft's latest policy change for the official Windows Store bans emulators outright. However, the software can still be found and downloaded online.
Sam Medley, 07 Apr 2017 22:19
The personal data of 100,000 taxpayers has been compromised through an exploit of the FAFSA program. (Source: IRS)

Hackers compromise U.S. taxpayer data through university financial aid system

Using an exploit in the Free Application for Federal Student Aid and tools used to retrieve tax data, hackers were able to breach part of the IRS database and steal personal data for 100,000 U.S. taxpayers.
Sam Medley, 07 Apr 2017 21:29
The U.S. House of Representatives has signed the action to repeal FCC regulations concerning user privacy.

United States House of Representatives votes to allows ISPs to sell browsing history

Both the House and Senate have now voted to allow ISPs to sell the personal data of their customers. The measure will go before President Trump, who is expected to sign the bill into action.
Sam Medley, 29 Mar 2017 22:34
Arizona Senator Jeff Flake introduced the repeal of the FCC regulations. (Source: Washington Times)

ISPs can sell your browsing history without your consent, Senate rules

FCC regulations that would disallow ISPs to share or sell users' internet browsing history and other private information without their explicit consent have been shot down in the US Senate.
Douglas Black, 27 Mar 2017 17:55
Most Android phones in the US are running old security software. (Source: Skycure)

Most Android devices are running old security patches and could be vulnerable

A whopping 71% of Android devices in the United States run security patches that are 2 months old or older. This could leave them vulnerable to exploits made known in the latest security update logs.
Sam Medley, 24 Mar 2017 21:18
Wikileaks says the CIA specifically targeted Apple products

Wikileaks says the CIA specifically targeted Apple products

The notorious activist group says that the CIA developed specialized tools to specifically target and infiltrate Apple products, namely Macbooks and iPhones. The tools have been in use since at least 2008.
Sam Medley, 24 Mar 2017 20:55
T-Mobile's Scam ID service will identify possible scam phone calls. (Source: T-Mobile)

T-Mobile fights scammers with call warnings

Two new programs, Scam ID and Scam Block, will help T-Mobile customers avoid scam phone calls by identifying known scam numbers and warning users. Clients can also opt in to Scam Block, which outright blocks known scammers.
Sam Medley, 24 Mar 2017 18:59
Google has admitted that less than half of the active Android devices in 2016 received security updates. (Source: Phone Arena)

Google promises better security for Android in 2017

Google has promised to provide more frequent and timely security updates for Android in 2017 due to the increasing number of Android-powered devices and the corresponding threat from malware.
Douglas Black, 23 Mar 2017 07:54
As of March 2017, about 97.2% of Android devices may be vulnerable to exploits in WikiLeaks' latest documents. (Picture source: Android Developers)

Google says it has patched exploits used by the CIA

Google is confident that the latest versions of Android and Chrome are not vulnerable to the hacking tools detailed in the latest Wikileaks dump. Older versions of the software, however, may still be vulnerable.
Sam Medley, 09 Mar 2017 23:44
The "Weeping Angel" exploit tricks users into thinking the TV is powered off while it is actually on and recording. (Source: Samsung)

Wikileaks reveals trove of CIA hacking tools for iOS and Android-driven devices

WikiLeaks has released a trove of information revealing the range of the CIA's hacking exploits and cyber-ordinance, including malware to use Samsung smart TV's for surveillance.
Douglas Black, 08 Mar 2017 06:58
"Smart" devices are smart because they collect and learn from data they collect from their users. (Source: The Motley Fool)

Consumers are still (rightfully) wary of smart home devices

A new research report released by Gartner has revealed consumers to be wary of the risks of IoT devices while skeptical of their benefits.
Douglas Black, 07 Mar 2017 09:55

Tags

3D Printing (231) 5G (5287) 6G (3) Accessory (9006) AI (2114) Alder Lake (1080) AMD (6199) Android (28123) Anime / Manga (51) Apple (5971) Arc (232) ARM (8639) Arrow Lake (324) Astronomy / Space (414) Audio (2767) Benchmark (555) Biotech (336) Blackwell RTX 5000 (297) Business (11710) Camera (1746) CES 2026 (222) Cezanne (Zen 3) (267) Charts (875) Chromebook (518) Climate (9) Comics (16) Concept / Prototype (222) Console (3918) Convertible / 2-in-1 (2170) CPU (275) Cryptocurrency (393) Cyberlaw (721) Deal (6111) Desktop (7561) DIY (398) Drone (182) E-Ink (166) E-Mobility (3981) Education (68) Exclusive (35) Fail (2109) FemTech (15) Foldable (1825) Gadget (5107) Galaxy A (222) Galaxy M (10) Galaxy S (2801) Galaxy Tab (664) Game Releases (877) Gamecheck (238) Gamescom 2025 (37) Gaming (20189) Garmin   Gator Range (1) Geforce (4885) Google Pixel (1640) GPU (2299) Hack / Data Breach (60) Handheld (1782) Health (71) Home Theater (1147) How To (99) Humor (23) IFA 2025 (86) Intel (2393) Intel Evo (392) Internet of Things (IoT) (1013) iOS (1340) iPad (322) iPad Pro (694) iPhone (2900) Jasper Lake (60) Laptop (13512) Launch (10956) Leaks / Rumors (16960) Linux / Unix (1022) List (406) Lucienne (Zen 2) (51) Lunar Lake (261) MacBook (1156) macOS (143) Medusa Point   Meteor Lake (382) Microsoft (397) Mini PC (1670) Monitor (2408) Movies / TV-Shows (186) MS Surface (64) MSI (524) NAS (63) Network (31) Nova Lake (6) Nvidia (824) Open Source (335) Opinion (396) Panther Lake (66) Public Transport (23) Radeon (548) Raptor Lake (728) Renewable (431) Renoir (379) Retro (221) Review Snippet (1642) RISC-V (58) Robot / Robotics (146) Robot Vacuum (78) Rollable (1) Rugged (195) Ryzen (Zen) (2206) Samsung (916) Science (1051) Security (1502) Server/Datacenter (140) SFF (6) Single-Board Computer (SBC) (609) Smart Home (3478) Smartphone (27390) Smartwatch (4533) Snapdragon X Series (138) Social Media (253) Software (10352) Sports / e-Sports (140) Storage (2667) Tablet (5626) ThinkPad (1676) Thunderbolt (1403) Touchscreen (8235) Ultrabook (2708) Virtual Reality (VR) / Augmented Reality (AR) (1009) Watch (27) Wearable (6258) Wi-Fi 7 (328) Wi-Fi 8   Windows (8345) Workstation (1374) XPS (424) Zen 3 (Vermeer) (352) Zen 4 (589) Zen 5 (499) Zen 6 (17)
Please share our article, every link counts!
Mail Logo
Google Logo Add as a preferred
source on Google
Redaktion, 2013-05- 8 (Update: 2013-09-27)