Microsoft, Amazon Top BEC's Favorite Brands

Microsoft, Amazon Top BEC's Favorite Brands

Nearly two-thirds of email attacks spoofing brand names impersonate Microsoft or Amazon, according to one of two studies released today on advanced emailed threats.

Microsoft Office Was Hackers' Favorite App Target This Year

Microsoft Office Was Hackers' Favorite App Target This Year

Kaspersky blocked 796.8 million attacks around the globe in Q1 2018, and the company found that one popular productivity suite was the victim of more than 47 percent of exploits: Microsoft Office.

Australian bill spells trouble for data privacy around the world

Australian bill spells trouble for data privacy around the world

An unlikely alliance of tech companies, start-ups and digital consumer rights groups has locked horns with the Australian government over its proposed anti-data encryption law, currently under review by the Parliamentary Joint Committee on Intelligence and Security (PJCIS).

YouTube CEO urges YouTube creators to protest European copyright law

YouTube CEO urges YouTube creators to protest European copyright law

Wojcicki focuses on Article 13 of the EU's new Directive on Copyright, which passed in early September and makes tech platforms liable for copyright-protected content. Essentially, this means that giant platforms that rely on user-generated content, including Google's YouTube, , and , would be responsible for making sure that users don't share copyrighted material.

Governments want your encrypted data, Australia wants them to have it, and you should be worried

Governments want your encrypted data, Australia wants them to have it, and you should be worried

This legislation comes after the Five Eyes intelligence alliance, including Australia, Canada, New Zealand, the U.S., and the U.K., released a statement calling for government access to encrypted files on the basis of national security and crime prevention.

Amazon staff said to be taking bribes to leak data

Amazon staff said to be taking bribes to leak data

The Wall Street Journal reports that Amazon employees have been bribed to leak corporate data - such as sales metrics and the personal details of reviewers - to sellers:

What Prevents Good Cybersecurity and Privacy Behaviors?

What Prevents Good Cybersecurity and Privacy Behaviors?

From a close reading of much of this prior work, my colleagues and I identified three inter-related high level barriers that may explain why advice about security and privacy is often ignored and why many security and privacy tools go largely unused: awareness, motivation, and knowledge.

Linux developers threaten to pull "kill switch"

Linux developers threaten to pull "kill switch"

Subject Re: A Plea to Unfuck our Codes of Conduct Regarding those who are ejected from the Linux Kernel Community after this CoC: Contributors can, at any time, rescind the license grant regarding their property via written notice to those whom they are rescinding the grant from (regarding their property (code)) .

Petition · European Commission: Investigate Axel Voss for undermining citizens digital rights in Europe · Change.org

Petition · European Commission: Investigate Axel Voss for undermining citizens digital rights in Europe · Change.org

We're asking our representatives and institutions to investigate and consider suspending Axel Voss, the rapporteur for the Copyright Directive, for potential conflict of interest and subversion of democracy within the European Union.

Hackers selling research phished from universities on WhatsApp

Hackers selling research phished from universities on WhatsApp

Iranian hackers have reportedly breached top British universities – including Oxford and Cambridge – to steal what the Telegraph says are “millions” of papers and academic research documents that they then put up for sale via WhatsApp and websites.

Thousands of MikroTik routers are snooping on user traffic

Thousands of MikroTik routers are snooping on user traffic

"The MikroTik RouterOS device allows users to capture packets on the router and forward the captured network traffic to the specified Stream server," the researcher said, adding that ports 20, 21, 25, 110, and 143 appear to be of the most interest to the eavesdroppers.