Jeremy Kirk

Australia Correspondent

Jeremy reports on security and regional news for the IDG News Service.

5 things you need to know about SSL

5 things you need to know about SSL

Here's a quick and dirty guide to SSL/TLS, one of the most important technologies for securing data on the Internet.

Vehicles are 'increasingly vulnerable' to hacking, FBI warns

Vehicles are 'increasingly vulnerable' to hacking, FBI warns

The FBI and the National Highway Traffic Safety Administration warned on Thursday that the rising use of computers in vehicles poses increasing risks of cyberattacks.

Stagefright exploit puts millions of Android devices at risk

Stagefright exploit puts millions of Android devices at risk

Millions of Android devices are at risk yet again after researchers found a new way to exploit an older vulnerability that was previously patched by Google.

TeslaCrypt ransomware now impossible to crack, researchers say

TeslaCrypt ransomware now impossible to crack, researchers say

The latest version of the TeslaCrypt ransomware has tidied up a weakness in previous versions that in some cases allowed victims to recover their files without paying a ransom.

Advertising-based cyberattacks hit BBC, New York Times, MSN

Advertising-based cyberattacks hit BBC, New York Times, MSN

Major websites including the BBC, Newsweek, the New York Times and MSN ran malicious online advertisements on Sunday that attacked users' computers, a campaign that one expert said was the largest seen in two years.

Google doubles its bounty for a Chromebook hack, to $100,000

Google doubles its bounty for a Chromebook hack, to $100,000

Google doubled the bounty it will pay for a successful exploit of its Chromebook laptop to $100,000, sweetening the pot in hopes of drawing more attention from security researchers.

Locky ransomware activity ticks up

Locky ransomware activity ticks up

Locky, a new family of ransomware that emerged in the last few weeks, has quickly made a mark for itself.

Experts warn that 'chip off' plan to access terrorist's iPhone is risky

Experts warn that 'chip off' plan to access terrorist's iPhone is risky

The iPhone 5c at the center of the legal battle between Apple and the FBI might be accessible through a delicate hardware technique, but experts warn it would be difficult.

Project issues 1 million free digital certificates in three months

Project issues 1 million free digital certificates in three months

Let's Encrypt, an organization set up to encourage broader use of encryption on the Web, has distributed 1 million free digital certificates in just three months.

Google patches remote execution flaws in Android

Google patches remote execution flaws in Android

Google has released 16 patches for Android, including one for a critical remote execution vulnerability in the operating system's mediaserver.

Apple shuts down first-ever ransomware attack against Mac users

Apple shuts down first-ever ransomware attack against Mac users

With the help of security researchers, Apple over the weekend quickly blocked a cyberattack aimed at infecting Mac users with file-encrypting malware known as ransomware.

Here's the password you should never use for an RDP system

Here's the password you should never use for an RDP system

A year-long experiment that baited hackers to try and break into systems netted an interesting result: a single letter, x, was one of the most common password guesses.

Malvertising campaigns are becoming harder to detect

Malvertising campaigns are becoming harder to detect

Jerome Segura, a senior security researcher with Malwarebytes, was recently stumped by a cyberattack he was studying. It seemed to keep vanishing.

New piece of OS X malware may track back to Hacking Team

New piece of OS X malware may track back to Hacking Team

Security researchers say they've analyzed a new piece of OS X malware likely linked to Hacking Team, the controversial Italian company that sells surveillance software to governments.

With few options, companies pay hush money to data thieves

With few options, companies pay hush money to data thieves

There's a disturbing new angle to cyberattacks that has become more common over the last year, and it is proving costly for organizations: extortion.

Tor users increasingly treated like second-class Web citizens

Tor users increasingly treated like second-class Web citizens

The Internet is becoming harder to browse for users of Tor, the anonymity network that provides greater privacy, according to a new study.

Baidu web browsers leaked sensitive information, researchers say

Baidu web browsers leaked sensitive information, researchers say

Two Web browsers developed by Chinese search giant Baidu have been insecurely transmitting sensitive data across the Internet, putting users' privacy at risk, according to a new study.

Source code for powerful Android banking malware is leaked

Source code for powerful Android banking malware is leaked

The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to a researcher with IBM.

Newest Android banking Trojan, Xbot, is also ransomware

Newest Android banking Trojan, Xbot, is also ransomware

A new kind of Android malware can steal online banking credentials and hold a device's files hostage for ransom, delivering a particularly nasty one-two punch.

Hospital pays $17K ransom to get back access to encrypted files

Hospital pays $17K ransom to get back access to encrypted files

A Los Angeles hospital has paid a $17,000 to cyberattackers who crippled its network by encrypting its files, a payment that will likely rekindle a fierce debate over how to deal with a problem known as ransomware.

Load More