Would you hire a convicted hacker? David Berlind presents a selection of what ZDNet readers said when they were asked
By ZDNet UK
| September 29, 2004 -- 10:35 GMT (03:35 PDT)
| Topic: Security
Unusual tech idols, so many Raspberry Pis, pioneer mobiles, luxury smartwatches, failed launches: Photos
3D body parts, iPhone privacy, tech's undead, vintage Macs, drool-worthy canteen food and more: Photos of the month
Robot dog, best AI films, iPhone 6 launch, Cold War bunker, email overload: Photos of the month
3D sweets, bots for tots, see-through trucks, Arduino pianos, and more: Photos
Intense scanning activity detected for BlueKeep RDP flaw
A threat actor hidden behind Tor nodes is scanning for Windows systems vulnerable to BlueKeep flaw.
Hackers are scanning for MySQL servers to deploy GandCrab ransomware
Serendipitous discovery unearths new threat for MySQL server owners.
Australian tech unicorn Canva suffers security breach
Hacker claims to have stolen the data of 139 million Canva users.
The security snapshot: We’re in the endgame now
Forrester addresses several ways CISOs can keep their organizations secure.
Cyber security 101: Protect your privacy from hackers, spies, and the government
Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.
Survey: Security is top worry as IT container use accelerates
The rush to containers and cloud IT is creating new security risks for companies, as they chase business agility through rapid app development
Snapchat internal tools abused to spy on users and pillage data
Staff members have allegedly abused their positions to spy on Snapchat users.
Windows 10 to warn about insecure WiFi networks using WEP or TKIP
Support for WEP and TKIP to be removed in future Windows 10 releases.
Equifax rating outlook decimated over cybersecurity breach
A Moody’s downgrade shows that poor security can have severe financial fallout.