Security

BT And KPMG: Businesses Are Engaged In An ‘Arms Race’ With Cybercriminals

Companies need to look for ways to go on the offensive against 'industrialised' cyber-criminals, finds a report from BT and…

9 years ago

EU Looks To Protect Europe With £1.5bn Cybersecurity Programme

As part of Digital Single Market, the European Commission initiates public-private investment programme to strengthen Europe's cybersecurity credentials

9 years ago

LizardStresser Webcam Botnet Strikes Brazil And US With IoT Attacks

Large financial institutions and gaming companies are amongst those hit by the latest IoT botnet attacks

9 years ago

Chinese Android Malware Infected 1.4m Devices, Earned £376,000 A Day

The rapidly spreading 'Hummer' Trojan installs unwanted apps, uses up bandwidth and can't be removed

9 years ago

Chinese Gambling Website Victim Of 470 Gbps DDoS Attack

'Largest assault to date' for mitigation provider Imperva Incapsula as gambling company hit by nine-vector DDoS

9 years ago

Belgian Appeal Strikes Down Facebook Privacy Ruling

The appeal annuls a ruling that had prompted Facebook to block access to its Belgian site for non-users

9 years ago

Euro 2016: Official App Exposes Personal Data

The influx of fans to France for Euro 2016 may represent a significant security risk for enterprises

9 years ago

InfoSec 2016: Why Ransomware Should Be Your Number One Concern

VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware

9 years ago

Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?

Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…

9 years ago

Android Malware Disguises Itself As WhatsApp, Uber And Google Play

Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data

9 years ago

Serious Vulnerabilities In Symantec Products Are ‘As Bad As It Gets’

Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users

9 years ago

Blindspotter Uses Machine Learning To Find Suspicious Network Activity

The use of machine learning to identify suspicious online activity is a new and important capability in securing the network,…

9 years ago

NASCAR Team Partners Malwarebytes After Ransomware Attack

Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware

9 years ago

US Customs To Request Social Media Data For Passengers

Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States

9 years ago

Office 365 Users Hit By ‘Widespread’ Ransomware Attack

But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours

9 years ago

Cisco Buys Cloud Security Vendor CloudLock

CloudLock's technology protects content based on remote services such as Office365, Google Drive and Salesforce

9 years ago

CryptXXX Variant Scores £26,000 In Ransomware Payments

An update to the CryptXXX ransomware has already received substantial ransom payments over a period of less than three weeks,…

9 years ago

Giant CCTV Camera Botnet Highlights IoT Security Threats

A botnet made up of more than 25,000 hacked security cameras spread around the world is being used to launch…

9 years ago

Bart Ransomware ‘Bypasses Corporate Firewalls’

The 'Bart' ransomware doesn't need to connect to an external server before encrypting a system's files and demanding £1,500

9 years ago

Security Tool Strengthens Tor And ‘Foils’ FBI Attacks

The tool, called Selfrando, could greatly improve on the attack protection provided by techniques such as ASLR, researchers say

9 years ago

Intel ‘Looks’ To Sell Off Security Unit

The chip maker is reportedly looking into unloading Intel Security amid rising demand from business

9 years ago

‘Godless’ Malware Brings Exploit Kit Finesse To Android

The malware's multiple exploits allow it to target 90 percent of current Android devices, researchers say

9 years ago

ICO: Future UK Data Protection Laws Must Equal Those Of EU

Safe Habour advice. British data protection act should be used when transferring data to US, says ICO

9 years ago

InfoSec 2016: Government Is Doing “An Awful Lot” On Cyber Security

But Intel Security’s Gordon Morrison says that a growing skills gap could be a worry

9 years ago

Uber Vulnerabilities Leak Rider Details And Journey History

Penetration testers brute force Uber for bug bounty programme, and also find hidden $100 free ride voucher

9 years ago

Study Claims HMTL5 Isn’t Much More Secure Than Flash

Flash not so bad? New report casts doubts on HTML5 adverts being safer than Adobe Flash

9 years ago

Quiz Of The Week: Cybersecurity In 2016

Test your mettle with our quiz and see how much you know about the cybersecurity world this year

9 years ago

Cisco Warns Of Libarchive File Compression Flaw

Patch it now! Popular open source file compression tool libarchive contains wide reaching vulnerabilities

9 years ago

Unknown Connections On LinkedIn Can Compromise Enterprise Security

Intel Security says employees are not being educated about the risks of adding people they don't know on LinkedIn amid…

9 years ago

iOS 10 Developer Preview Has An Unencrypted Kernel

The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security…

9 years ago