Despite online gaming being called, well, gaming, it isn’t all just for fun. Whether players are gaming in their downtime, competing as part of a team, hoping to catch corporate attention and earn sponsorships, or actually making a living with their abilities, online games have become pretty serious stuff. Precisely...
The World Economic Forum has led the creation of an industry consortium focused on improving the cybersecurity of financial technology companies, as collaboration between fintechs and financial institutions grows. The consortium's founding members include Citigroup Inc, online lender Kabbage, the Depository Trust & Clearing Corporation, Zurich Insurance Group and Hewlett Packard Enterprise,...
Using online banking services on laptops/desktops and mobile devices is a common phenomenon in these days. However, it cannot be denied that such internet-based transactions are vulnerable to various risks, sometimes leading to compromising of login details, and resultantly stealing of hard-earned money. Using an effective VPN (Virtual Private Network)...
We’ve all experienced this at some point of time – you desperately need to log into an important website, but just can’t remember the new password you were forced to create a fortnight ago. You even saved it in a notepad file but can’t locate it now. You try...
The British government has unveiled a tool that can accurately detect extremist content and block it from being viewed, the media reported on Tuesday. Home Secretary Amber Rudd told the BBC that she would not rule out forcing technology companies to use it by law. Rudd visited the US to meet tech companies...
Google has confirmed that beginning in July 2018, with the launch of Google Chrome 68, all websites which connect via an HTTP connection, instead of HTTPS, will be clearly marked as “not secure”. Last year, Google started out by only marking pages without encryption that collect passwords and credit card information,...
Kaspersky Lab researchers have helped uncover a number of unknown vulnerabilities that have left gas stations around the world exposed to remote takeover, often for years. The vulnerabilities were found in an embedded gas station controller of which there are currently over 1,000 installed and online. The manufacturer was...
Battling botnets has long been a war fought on multiple fronts. In the earlier days of DDoS attacks it was up to computer owners to try and keep their machines from being enlisted in botnets, and up to website owners to protect against DDoS attacks. Then botnets branched out from...
The Government of Uganda through the European Union and Council of Europe has obtained support to assist Uganda harmonize legislation on Cybercrime and electronic evidence towards Ratification of the Budapest Convention on Cyber Crime. The convention is an international treaty that seeks to address Internet and Computer Crime by harmonizing...
Micro-blogging site Twitter has admitted that specific locations included with some of its users' tweets were revealed without their permission last week due to a "bug". "We've discovered an issue for a small percentage of people who recently had location-sharing on, Tweeted from twitter website, and tapped to add an emoji or...