Virus

Symantec: Hackers Are Becoming Expert IP Hunting Professionals

Fujitsu Forum 2016: Cyber crime can now be considered a professional, targeted business, according to Symantec

8 years ago

DocuSign Opens Cybersecurity Centre In Dublin

DocuSign continues European expansion with cybersecurity investment in the Irish capital

8 years ago

Yahoo Investigates Cookie Powered Password Bypass Hack

The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny

8 years ago

Splunk: Machine Data Could Be The Key To Tackling Cyber Threats

INTERVIEW: Splunk's security evangelist Matthias Maier talk bolstering cyber defences with machine data

8 years ago

Darktrace: Machine Learning Will Filter Through The Noise Of Cyber Security

INTERVIEW: Machine learning can help filter the increasing noise on complex IT networks to spot the emerging cyber threats that…

8 years ago

Machine Learning And AI Could Be The Future Of Cyber Security

IN-DEPTH: As the war against malware rages, smart software could be the key to getting ahead of hackers

8 years ago

Zero-Day Security Hole In Wix Hosting Service Exposed Millions Of Websites

Infected sites could have been turned into botnets to launch DDoS attacks and spread malware

8 years ago

National Cyber Security Centre Head: Fearmongering Must Be Replaced With Facts

National Cyber Security Centre chief Dr Ian Levy wants an empirical, transparent approach to cybersecurity policy - not hysteria

8 years ago

Facebook Blocks Insurance Firm Admiral From Using Profile Data

Is Facebook a privacy champion? Admiral banned from using FB data in order to price insurance policies

8 years ago

UK Government Pledges ‘To Strike Back’ In Cyberwar As It Invests £1.9bn In Cybersecurity

Philip Hammond outlines the government's new cybersecurity strategy and how £1.9 billion will boost defences, enable law enforcement and aid…

8 years ago

ShadowBrokers Data Dump Leaks Compromised Servers Used By NSA For Hacking Operations

The servers are claimed to have been used by NSA-sponsored Equation Group as staging areas for covert hacking activity

8 years ago

Lincolnshire Hospitals Cancel Operations After Their IT Suffers Virus Infection

The hospital has been forced to shut down it IT network to seek out and destroy the virus

8 years ago

Google’s AI Neural Networks Learn To Create Their Own Encryption

Two neural nets were created to communicate securely while a third tried to crack their inhuman cipher messages

8 years ago

Microsoft Azure IoT Protects Against Cyber Attacks With Expert-Driven Security Program

Third-party security auditors will be brought in to help Microsoft Azure customers secure their Internet of Things deployments

8 years ago

Massive Cyber-Attack Shows Risk Of Poor Security On Network Nodes

ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas…

8 years ago

What Makes Ransomware the Worst Type of Malware

In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in…

8 years ago

Oracle Fixes 253 Security Flaws In October Update

Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.

8 years ago

Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild

The bug affects most versions of Linux potentially exposing huge numbers of machines to hackers

8 years ago

Malwarebytes Snaps-Up French Startup AdwCleaner

The acquisition gives Malwarebytes access to the startup's adware an unwanted programe fighting tool

8 years ago

Selfie Stealing Android Trojan Discovered By McAfee Labs

Tweaked Acecard trojan aims to trick gullible Android users into sending selfies and photos of their IDs

8 years ago

Symantec Spots Student Scam Powered By Ascesso Trojan

Scammers are trying to trick students into paying for application to the US student loan forgiveness programme

8 years ago

Facebook Twitter & Instagram Ban Data Monitoring App Geofeedia

New privacy row as social networking sites halt access by data gathering app used by law enforcement

8 years ago

US Military Looks To Blockchain To Secure Weapon Data And Nukes

Is Blockchain a possible solution for securing weapons data for the US military, including its nuclear capabilities?

8 years ago

Cyber Criminals Using Odinaff Trojan To Infiltrate Bank Systems

Symantec has discovered a trojan capable of hiding in the networks of financial institutions

8 years ago

Persistent Warnings Are Causing ‘Security Fatigue’

People are becoming weary of constant security advice and businesses could pay the price for poor decisions, a report has…

8 years ago

IoT And The Enterprise World Must Put Cyber Security At The Forefront Warn Experts

IP Expo 2016: Sophos, Kaspersky and Trend Micro talk future threats from IoT, Hired cyber criminals, and security education

8 years ago

Turkey, Italy And Hungary Riddled With Botnets Finds Norton Research

Botnets hop on high-speed city infrastructure to fire malware, spam and other threats across the Internet

8 years ago

Shellshock Bug Back And Stronger Than Ever

IBM Managed Security Services identifies poor server patching as the reason for the bug's survival

8 years ago

Federal Agencies Working With States to Guard Voter Data Security

Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in…

8 years ago

Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks

ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security…

8 years ago