Hotel Pays Ransom To Let Guests Back In To Rooms
A luxury Austrian hotel had to pay a €1,500 ransom to hackers to allow guests back in to their locked rooms after the hackers disabled the hotel’s hi-tech room locking system.
A luxury Austrian hotel had to pay a €1,500 ransom to hackers to allow guests back in to their locked rooms after the hackers disabled the hotel’s hi-tech room locking system.
According to recent reports, the Trump administration may be about to introduce an immigration policy that will require foreign travellers to the U.S. to divulge their social media profiles, contacts and browsing history.
Small and mid-sized businesses who didn’t take up the earlier offer to get a free Microsoft Windows 10 upgrade are now being given another opportunity to do so.
The UK government’s post-Brexit strategy green paper ‘Building our Industrial Strategy’ shows that its previous commitments to more funding for rural broadband and rolling-out and 5G mobile networks is still on the cards.
Information Services Group (ISG) figures show that in 2016, traditional outsourcing contracts were replaced by cloud-based services to the point where spending on cloud-based contracts increased by 33% compared to 2015.
Akamai figures show that the inauguration of President Donald Trump broke all live video streaming records in terms of the rate of data transmission in Terabytes per second (tbps).
A family in Texas is suing Apple because they believe that a driver who was allegedly distracted by a FaceTime call on his iPhone while at the wheel was the reason for a road accident which resulted in the death of their five-year-old daughter.
The EU has voted to give a Bill of Rights to robots that will give them “electronic personhood” status in the eyes of the Law in anticipation of a new kind of industrial robot revolution.
The Russian cybersecurity company Kaspersky has warned of an Android Trojan that uses compromised devices to attack WiFi routers.
Dubbed as “the Switcher Trojan”, it is distributed through counterfeit versions of popular apps, and rather than exploiting compromised devices directly, it seeks to take control of WiFi routers in order to re-direct traffic.
A version of the Petya ransomware (which has been dubbed as “GoldenEye”) is targeting human resources (HR) departments with counterfeit job applications that are infected with malware.