Alleged hacker puts up Tokopedia’s user details for sale on darknet

Indonesia’s largest e-commerce platform, Tokopedia said, it is investigating an attempted cyber attack and claims that details of millions of its users had been leaked online. “We found that there had been an attempt to steal data from Tokopedia users,” said Tokopedia’s spokesman. “However, Tokopedia ensures that crucial information such as passwords remains successfully protected…

Cyber security specialists team up to fight COVID-19 cyber threats

Cyber security specialists have formed an international group to fight hacking related activities revolving around China’s coronavirus. The international group consisting of nearly 400 volunteers with expertise in cybersecurity is called the COVID-19 CTI League. The group which monitors cyber threat intelligence spans across 40 countries and includes professionals in senior positions at major tech…

Work-from-home creates perfect opportunities for cyber criminals, corporates spies and hackers: cyber security experts

With companies temporarily closing their offices and with more people working from home with company data because of the Wuhan coronavirus, hackers are likely to take advantage of the situation, said cyber security experts. Government officials from the United States and Britain along with others have warned on the cyber security dangers of working remotely…

Japan approves bill to develop 5G, drone technologies

On Tuesday, Japan’s cabinet approved a bill to support companies to develop secure 5G mobile networks and drone technologies midst a growing alarm from Tokyo policymakers over Chinese influence over the said technologies. The bill aims to provide companies, who want to develop the technologies, funds which will attract low-interest rate from government-affiliated financial institutions…

White House unveils regulatory principles that will govern usage of AI

On Tuesday, the White House proposed regulatory principles to govern the development and use of artificial intelligence (AI) aimed at limiting authorities’ “overreach”; it also said, it wants European authorities to follow its lead and avoid aggressive approaches. Producing a fact sheet the White House said, federal agencies should “conduct risk assessment and cost-benefit analyses…

Czechoslovakia will follow Germany’s approach vis-a-vis Huawei

Much like the issues highlighted by the United States, Czech cyber security watchdog NUKIB has also warned of potential risks of allowing Huawei to build the backbone of the country’s communication network. On Thursday, Czechoslovakia’s industry minister was quoted as saying, it will follow the approach of Germany and other neighboring countries in addressing issues…

Hackers warm up to carmakers at the DEFCON cyber security conference at Las Vegas

With vehicles getting increasingly digital, carmakers are warming to White Hat cyber security professionals who scour for vulnerabilities in transportation systems before Black Hat hackers exploit them for commercial or other gains. In a significant development, carmakers are boost efforts to discover lurking vulnerabilities in their increasingly digital car offerings from helpful and friendly hackers.…

Apple offers up to $1 million for remote access exploit for iPhones and cloud-based backups

Apple launched the challenge at the annual Black Hat security conference in Las Vegas. In order to remove exploitable vulnerabilities from its mobile operating system, Apple Inc has announced a bounty of up to $1 million to cyber security researchers who detect flaws in iPhones. This is the largest ever reward Apple has offered to…