Virus

MarsJoke Ransomware Targets US Government And Education Institutions

Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims

8 years ago

DDoS Attacks Heading Toward 1-Terabit Record

ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not…

8 years ago

Yahoo, LinkedIn, Apple iCloud: 10 Big Data Breaches

Data breaches from hack attacks continue to get bigger and bolder but which of these do you remember?

8 years ago

What Should You Do After Massive Yahoo Hack?

ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next

8 years ago

Sky And BT Email Users Are Caught Up In Yahoo Password Hack

Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach

8 years ago

Latest iOS 10 Security Features Help Apple’s Business Case

ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according…

8 years ago

Hackers Are Using Consumer IoT Devices To Launch DDoS Attacks

Lax IoT security is allowing cyber criminals to syphon bandwidth to launch attacks on big businesses

8 years ago

Apple macOS Sierra Fixes 68 Vulnerabilities

macOS Sierra isn't just a pretty face. Apple has patched quite a few security flaws, including one that affects Docker

8 years ago

Malicious Android Apps Due To Increase By 400 Percent In 2016

Webroot's threat intelligence data identifies Asian countries as a hotbed of malicious IP addresses

8 years ago

Hackers Seize Control Of Tesla Model S From 12 Miles Away

Keen Security Lab researchers discover a cyber vulnerability in Tesla's connected car

8 years ago

Android Scam Call And SMS Security Is Undone By HTML Exploiting Malware

Android's built-in protection which flags warnings about apps trying to send premium rate messages without user consent can be manipulated…

8 years ago

Microsoft Isn’t Patching ‘Significant’ Windows Safe Mode Flaw

Researchers say Windows 10 Safe Mode flaw is easy to exploit but Microsoft doesn't acknowledge it as a primary threat

8 years ago

Google Pulls Four Overseer Spyware Infected Apps From The Play Store

The spyware harvested user and device data from infected Android smartphones

8 years ago

Bruce Schneier: ‘Someone Is Learning How to Take Down the Internet’

Security expert Bruce Schneier suspects state-sponsored DDoS attacks are being levied at major internet infrastructure providers to test cyber defences

8 years ago

Ransomware Forces Hospitals To Payout $100,000 To Cyber Criminals

Intel Security cyber threat data idetifies the legacy IT of hospital as vulnerable to hackers

8 years ago

One Year Post-IPO, Sophos Extending Its Security Platform

Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016

8 years ago

Google Patches 55 Android Vulnerabilities in September Update

More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for…

8 years ago

Linux Networking Flaw Allows Attacker To Trick Safety Mechanism

A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?

8 years ago

Linux Trojan Written In Go Mines For Cryptocurrencies

'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software

8 years ago

FTC Commissioner Looking For Hackers’ Help With Consumer Privacy

FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…

8 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

8 years ago

Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil

Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games

8 years ago

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

8 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

8 years ago