France, Britain agree to invest 2 billion euros in drone prototype project

(L-R) French State Secretary for European Affairs Harlem Desir, French Defence Minister Jean-Yves Le Drian, Britain's Prime Minister David Cameron, French President Francois Hollande, Britain's Foreign Secretary Phillip Hammond, and French Foreign Minister Jean-Marc Ayrault ... Reuters/Philippe Woja...

Continue reading

Indian phone maker Micromax's CEO quits amid falling sales

An employee stands at the counter of Micromax mobile phones at a showroom in New Delhi December 6, 2013. Reuters/Adnan Abidi/Files India's second-largest phonemaker Micromax said on Thursday Chief Executive Vineet Taneja has left the company to "pursue other opportunities", at a time when the compan...

Continue reading

Google's self-driving car team beefs up auto experience

Google's self-driving car team is expanding and hiring more people with automotive industry expertise, underscoring the company's determination to move the division past the experimental stage. The operation now employs at least 170 workers, according to a Reuters review of their profiles on LinkedI...

Continue reading

Kids and Screenshots

If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Don't Trust Links Sent in Email Messages

A common method cyber criminals use to hack into people's computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a link, you may be taken to a site that attempts to ...

Continue reading

Don't Login on Untrusted Computers

A password is only as secure as the computer or network it is used on. As such, never log in to a sensitive account from a public computer, such as computers in a cyber cafe, hotel lobby or conference hall. Bad guys target public computers such as these and infect them on purpose. The moment you typ...

Continue reading

You Are a Target

You may not realize it, but you are a target. Your computer, your work and personal accounts and your information are all highly valuable to cyber criminals. Be mindful that bad guys are out to get you.

Reporting an Incident

Eventually, we all get hacked. The bad guys are very persistent and we can all make a mistake. If a phone call from the "Help Desk" doesn't sound quite right, if an email seems suspicious or if a program you installed starts acting funny, ask for help! Your security team is there to help you. The so...

Continue reading

The Lowdown on the Apple-FBI Showdown

Many readers have asked for a primer summarizing the privacy and security issues at stake in the the dispute between Apple and the U.S. Justice Department, which last week convinced a judge in California to order Apple to unlock an iPhone used by one of assailants in the recent San Bernardino m...

Continue reading

The Lowdown on the Apple-FBI Showdown

Many readers have asked for a primer summarizing the privacy and security issues at stake in the the dispute between Apple and the U.S. Justice Department, which last week convinced a judge in California to order Apple to unlock an iPhone used by one of assailants in the recent San Bernardino m...

Continue reading

Dell to Customers: Report ‘Service Tag’ Scams

Computer maker Dell is asking for help in an ongoing probe into the source of customer information that appears to have somehow landed in the laps of fraudsters posing as Dell computer support technicians. KrebsOnSecurity readers continue to report being called by scammers posing as Dell suppor...

Continue reading

Dell to Customers: Report ‘Service Tag’ Scams

Computer maker Dell is asking for help in an ongoing probe into the source of customer information that appears to have somehow landed in the laps of fraudsters posing as Dell computer support technicians. KrebsOnSecurity readers continue to report being called by scammers posing as Dell suppor...

Continue reading

This is Why People Fear the ‘Internet of Things’

Imagine buying an internet-enabled surveillance camera, network attached storage device, or home automation gizmo, only to find that it secretly and constantly phones home to a vast peer-to-peer (P2P) network run by the Chinese manufacturer of the hardware. Now imagine that the geek g...

Continue reading

This is Why People Fear the ‘Internet of Things’

Imagine buying an internet-enabled surveillance camera, network attached storage device, or home automation gizmo, only to find that it secretly and constantly phones home to a vast peer-to-peer (P2P) network run by the Chinese manufacturer of the hardware. Now imagine that the geek g...

Continue reading

The Great EMV Fake-Out: No Chip For You!

Many banks are now issuing customers more secure chip-based credit cards, and most retailers now have card terminals in their checkout lanes that can handle the “dip” of chip-card transactions (as opposed to the usual swipe of the card’s magnetic stripe). But comparatively few reta...

Continue reading

The Great EMV Fake-Out: No Chip For You!

Many banks are now issuing customers more secure chip-based credit cards, and most retailers now have card terminals in their checkout lanes that can handle the “dip” of chip-card transactions (as opposed to the usual swipe of the card’s magnetic stripe). But comparatively few reta...

Continue reading

Adobe, Microsoft Push Critical Updates

Adobe has issued security updates to fix weaknesses in its PDF Reader, Cold Fusion and Flash Player products. Microsoft meanwhile today released 16 update bundles to address dozens of security flaws in Windows, Internet Explorer and related software. Microsoft’s patch batch includes updat...

Continue reading