Karl Thomas

Independent Correspondent



148 articles by Karl Thomas

Terracotta VPN network helps hackers remain anonymous

Terracotta VPN network helps hackers remain anonymous

Terracotta VPN network helps hackers remain anonymous

Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.

Karl Thomas05 Aug 20151 min. read


Privacy

Hacker sends woman pictures of herself from her own webcam

Hacker sends woman pictures of herself from her own webcam

Privacy

Hacker sends woman pictures of herself from her own webcam

Hacker sends woman images of herself and her boyfriend, which were captured through their own webcam.

Karl Thomas04 Aug 20152 min. read


Hackers exploit OS X zero-day vulnerability

Hackers exploit OS X zero-day vulnerability

Hackers exploit OS X zero-day vulnerability

Hackers have exploited a zero-day vulnerability in the latest version of Apple’s OS X.

Karl Thomas04 Aug 20151 min. read


Cybercrime

Indiana's AG launches investigation into major data breach

Indiana's AG launches investigation into major data breach

Cybercrime

Indiana's AG launches investigation into major data breach

Indiana's Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.

Karl Thomas03 Aug 20152 min. read


Facebook Security Checkup feature now available

Facebook Security Checkup feature now available

Facebook Security Checkup feature now available

Facebook has made a new feature called Security Checkup generally available after testing on an invite-only group, according to SoftPedia.

Karl Thomas31 Jul 20151 min. read


Cybercrime

United Airlines customer flight records breached

United Airlines customer flight records breached

Cybercrime

United Airlines customer flight records breached

United Airlines customer flight records have been lost in a data breach it has been reported.

Karl Thomas30 Jul 20151 min. read


Cybersecurity is increasingly a 'board-level' issue, finds report

Cybersecurity is increasingly a 'board-level' issue, finds report

Cybersecurity is increasingly a 'board-level' issue, finds report

The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.

Karl Thomas29 Jul 20151 min. read


Privacy

‘Keystroke Biometrics’ exploit defeats Tor privacy

‘Keystroke Biometrics’ exploit defeats Tor privacy

Privacy

‘Keystroke Biometrics’ exploit defeats Tor privacy

Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor.

Karl Thomas29 Jul 20151 min. read


New report explains gulf between security experts and non-experts

New report explains gulf between security experts and non-experts

New report explains gulf between security experts and non-experts

Security experts and non security experts take very different attitudes to staying safe online, according to new research.

Karl Thomas28 Jul 20152 min. read