Security

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

8 years ago

Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In

BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…

8 years ago

Apple Launches £150,000 Bug Bounty Program

BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware

8 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

8 years ago

ATM Hack Gives Attackers Cash And Account Data

BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures

8 years ago

IBM Launches X-Force Red Pen Testing Task Force

IBM security group will test the mettle of security policies by carrying out testing on networks, hardware and humans

8 years ago

Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m

Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack

8 years ago

Researchers Discover Major HTTP/2 Flaws

Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution

8 years ago

Kaspersky Lab Creates Bug Bounty Program

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

8 years ago

Ruckus Routers Found With Multiple Security Flaws

Tripwire research finds Ruckus routers are susceptible to intruders

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Google Releases Customer-Supplied Encryption Keys For Cloud

Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine

8 years ago

Web Users Are Still Being Tracked By Their Smartphone’s Battery Status

Battery Status API in HTML5 is being used to track user activity, warn security researchers

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

Yahoo ‘Aware’ Of Data Breach Claim

Yahoo said it is investigating reports that 200 million users' data is being sold online

8 years ago

GhostMail Ends Services ‘To Prevent Misuse’

GhostMail said it doesn't want its encrypted email service used by 'the wrong people'

8 years ago

IT Worker Jailed For Disabling Citibank Network

The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

WhatsApp ‘Doesn’t Fully Delete Messages’

Deleted WhatsApp messages could be easy to recover, with unencrypted copies stored on iCloud, a researcher finds

8 years ago

SwiftKey Stops Cloud Sync Following User Data Leak

SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service

8 years ago

AdGholas Malvertising Campaign Closes After Proofpoint Discovery

AdGholas malvertising campaign closes after pulling in at least a million victim computers a day

8 years ago

Robocall Plague Won’t Be Easy To Solve Despite FCC Call For Action

ANALYSIS: Recent FCC pressure is resulting in some movement by carriers to try to quell robocalls, but much needs to…

8 years ago

Stagefright Poses Serious Risks One Year After It First Surfaced

ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws…

8 years ago

Cyber Attack Uses Google Drive To Deliver 9002 Trojan

Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries

8 years ago

KeySniffer Flaw Exposes Wireless Keyboard Typing

Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away

8 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

8 years ago

Security Firms And Police Fight Back Against Ransomware

No More Ransom offers decryption keys to encourage ransomware victims not to pay

8 years ago

O2 Confirms Customer Data For Sale Online

Details were reportedly stolen using credentials leaked from a gaming site three years ago

8 years ago

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

8 years ago

Hackers Collect £15,000 For Pornhub Exploit

The attack provided complete access to Pornhub's database and exposed two PHP flaws

8 years ago