Security

IBM Launches X-Force Red Pen Testing Task Force

IBM security group will test the mettle of security policies by carrying out testing on networks, hardware and humans

8 years ago

Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m

Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack

8 years ago

Researchers Discover Major HTTP/2 Flaws

Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution

8 years ago

Kaspersky Lab Creates Bug Bounty Program

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

8 years ago

Ruckus Routers Found With Multiple Security Flaws

Tripwire research finds Ruckus routers are susceptible to intruders

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Google Releases Customer-Supplied Encryption Keys For Cloud

Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine

8 years ago

Web Users Are Still Being Tracked By Their Smartphone’s Battery Status

Battery Status API in HTML5 is being used to track user activity, warn security researchers

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

Yahoo ‘Aware’ Of Data Breach Claim

Yahoo said it is investigating reports that 200 million users' data is being sold online

8 years ago

GhostMail Ends Services ‘To Prevent Misuse’

GhostMail said it doesn't want its encrypted email service used by 'the wrong people'

8 years ago

IT Worker Jailed For Disabling Citibank Network

The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

WhatsApp ‘Doesn’t Fully Delete Messages’

Deleted WhatsApp messages could be easy to recover, with unencrypted copies stored on iCloud, a researcher finds

8 years ago

SwiftKey Stops Cloud Sync Following User Data Leak

SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service

8 years ago

AdGholas Malvertising Campaign Closes After Proofpoint Discovery

AdGholas malvertising campaign closes after pulling in at least a million victim computers a day

8 years ago

Robocall Plague Won’t Be Easy To Solve Despite FCC Call For Action

ANALYSIS: Recent FCC pressure is resulting in some movement by carriers to try to quell robocalls, but much needs to…

8 years ago

Stagefright Poses Serious Risks One Year After It First Surfaced

ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws…

8 years ago

Cyber Attack Uses Google Drive To Deliver 9002 Trojan

Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries

8 years ago

KeySniffer Flaw Exposes Wireless Keyboard Typing

Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away

8 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

8 years ago

Security Firms And Police Fight Back Against Ransomware

No More Ransom offers decryption keys to encourage ransomware victims not to pay

8 years ago

O2 Confirms Customer Data For Sale Online

Details were reportedly stolen using credentials leaked from a gaming site three years ago

8 years ago

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

8 years ago

Hackers Collect £15,000 For Pornhub Exploit

The attack provided complete access to Pornhub's database and exposed two PHP flaws

8 years ago

BlackBerry Packs Good Dynamics Apps Into Microsoft Azure

Good Dynamics Secure Mobility Platform now available in Microsoft Azure Marketplace

8 years ago

Estonia Wants UK ‘Data Embassy’ To Protect Citizen Data Amid Cyberattack Fear

Threat of cyberattacks prompt Estonian officials to investigate possibility of using UK data centres for citizen data

8 years ago

ONS Figures Show UK Cybercrime Doubled In Past Year

Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime

8 years ago

‘Apple’s Stagefright’: iOS And Mac Users Urged To Update Immediately

iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…

8 years ago

HTTpoxy Flaw Re-emerges After 15 Years And Gets Fixed

After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…

8 years ago