by ray | Aug 7, 2015 | Security
FOR A SECRETARY of state, running your own email server might be a clever—if controversial—way to keep your conversations hidden from journalists and their pesky Freedom of Information Act requests. But ask a few security experts, and the consensus is that...
by ray | Aug 7, 2015 | Security
Researchers at the security startup Shape Security say they’ve found a strain of malware on a client’s network that uses that new, furtive form of “command and control”—the communications channel that connects hackers to their malicious software—allowing them to send...
by ray | Aug 7, 2015 | Security
SO MANY HACKS, so few days in the week to write alarming stories about every one. Here’s our roundup of what you have may missed this week. First, some news: a shocking revelation that the GCHQ, England’s spy organization, has been spying on Amnesty International....
by ray | Aug 6, 2015 | Cloud Tools, Tech News
Cloud storage and computing is one of the most game-changing computing models of the last 10 years, and small businesses can take advantage of this innovation in a variety of ways. Many businesses have already adopted cloud technology, and more do every day –...
by ray | Aug 5, 2015 | Security
So many hacks, so few days in the week to write alarming stories about every one. Every weekend, WIRED Security rounds up the security vulnerabilities and privacy updates that didn’t quite rise to our level for in-depth reporting this week, but deserve your attention...
by ray | Aug 5, 2015 | Security
FEW NEWS EVENTS can unleash more schadenfreude within the security community than watching a notorious firm of hackers-for-hire become a hack target themselves. In the case of the freshly disemboweled Italian surveillance firm Hacking Team, the company may also serve...