Security

FTC Commissioner Looking For Hackers’ Help With Consumer Privacy

FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…

8 years ago

Delta Resumes Flights Following Computer Glitch

The airline had grounded all flights around the world following a computer system outage

8 years ago

Google Research Finds Nuisance Software Deluge

Users are being targeted by more than 60 million download attempts per week

8 years ago

900 Million Android Devices ‘Vulnerable To Attack’

The QuadRooter bugs could allow seemingly harmless apps to take over many Android gadgets

8 years ago

Apple Emergency Update Fixes Major Flaw With iOS 9.3.4

The latest vulnerability could allow attackers to take over the root functions of an iOS device

8 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

8 years ago

Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil

Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games

8 years ago

State Of Ransomware: More Than Half Of UK Firms Are Victims

Crippling threat...20 percent of firms hit by ransomware had to cease business operations

8 years ago

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

8 years ago

Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In

BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…

8 years ago

Apple Launches £150,000 Bug Bounty Program

BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware

8 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

8 years ago

ATM Hack Gives Attackers Cash And Account Data

BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures

8 years ago

IBM Launches X-Force Red Pen Testing Task Force

IBM security group will test the mettle of security policies by carrying out testing on networks, hardware and humans

8 years ago

Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m

Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack

8 years ago

Researchers Discover Major HTTP/2 Flaws

Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution

8 years ago

Kaspersky Lab Creates Bug Bounty Program

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

8 years ago

Ruckus Routers Found With Multiple Security Flaws

Tripwire research finds Ruckus routers are susceptible to intruders

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Google Releases Customer-Supplied Encryption Keys For Cloud

Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine

8 years ago

Web Users Are Still Being Tracked By Their Smartphone’s Battery Status

Battery Status API in HTML5 is being used to track user activity, warn security researchers

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

Yahoo ‘Aware’ Of Data Breach Claim

Yahoo said it is investigating reports that 200 million users' data is being sold online

8 years ago

GhostMail Ends Services ‘To Prevent Misuse’

GhostMail said it doesn't want its encrypted email service used by 'the wrong people'

8 years ago

IT Worker Jailed For Disabling Citibank Network

The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

WhatsApp ‘Doesn’t Fully Delete Messages’

Deleted WhatsApp messages could be easy to recover, with unencrypted copies stored on iCloud, a researcher finds

8 years ago

SwiftKey Stops Cloud Sync Following User Data Leak

SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service

8 years ago

AdGholas Malvertising Campaign Closes After Proofpoint Discovery

AdGholas malvertising campaign closes after pulling in at least a million victim computers a day

8 years ago

Robocall Plague Won’t Be Easy To Solve Despite FCC Call For Action

ANALYSIS: Recent FCC pressure is resulting in some movement by carriers to try to quell robocalls, but much needs to…

8 years ago