Security

‘Certifi-Gate’ Security Flaw Hits Millions Of Android Devices

Smartphones from LG, Samsung, HTC and ZTE could all be at risk, Check Point team warn

9 years ago

New Techniques Could Prevent Use-After-Free Exploits: Black Hat

The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that…

9 years ago

Open Network Switches Pose Security Risk, Researcher Says

At the Black Hat show, a security expert demonstrates how vulnerable SDN switches that use the ONIE software are open…

9 years ago

Watch Out: That Windows 10 Update Might Be Ransomware

Bitdefender study reveals criminals are sending out Windows 10 upgrade emails to disguise CTB Locker ransomware

9 years ago

Android Fingerprint Readers Are Also A Security Risk

It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find

9 years ago

Texas Drone Uncovers Scale Of IoT Security Worries

Austin-based drone discovers details of 1,600 IoT devices in just a few neighbourhoods

9 years ago

Samsung, Google Nexus Devices To Get Monthly Android Security Updates

Smartphones and tablets will be among the first to benefit from incremental updates to Android

9 years ago

Beware – Your Smart Home Might Be A Massive Security Risk

Tripwire survey finds zero-day vulnerabilities in many of the leading smart home hubs

9 years ago

FBI Called In To Investigate Hillary Clinton Email Set-Up

FBI agents are looking into the security of the presidential hopeful’s private account

9 years ago

BIND Flaw Opens Door To Hacker Attacks On DNS

Patch now! BIND flaw is being exploited by hackers and websites can be taken offline, researchers warn

9 years ago

Employees Just Don’t Care About Keeping Company Data Safe With BYOD

Kaspersky survey finds only one in ten workers bothering to keep work files safe from cyber attack

9 years ago

Two Major Mac OS X Vulnerabilities Bring Apple Security Approach Under Scrutiny

Researchers find exploit for previously known vulnerability and create firmware worm that can spread without physical network

9 years ago

Q&A With Black Hat, DEF CON Founder Jeff Moss

Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always…

9 years ago

Yahoo Ad Network Spreads Malware – Again

The latest malicious ad campaign follows an incident that affected Yahoo and AOL last year

9 years ago

Microsoft Tests Quantum Computer-Proof Web Encryption

New system may allow the web's SSL systems to fend off attacks by advanced quantum computers

9 years ago

How Finance Firms Can Reduce Data Security Risk

IT outsourcing and managed services specialist, Advanced 365, offers its top tips on defending against new cyber threats

9 years ago

Could Your Phone’s Battery Be Spying On You?

Researchers reveal that a flaw in HTML5 API can be used to track users across the web

9 years ago

How To Protect Your Business From A DDoS Attack

Margee Abrams, security services product marketing at Neustar, a real-time information and analytics firm, says criminals will steal from you…

9 years ago

Leaked NSA Map Details China ‘Cyber-Espionage’ Attacks

A secret map pinpoints successful attacks on companies including Google and Lockheed Martin

9 years ago

NatWest Online Banking Affected By DDoS Attack

Friday's attack marks the fifth time in the past three years that NatWest's online banking service has been hit by…

9 years ago

Mobile Malware ‘Grows Almost Three-Fold’ In Just Three Months

However the total number of global threats in Q2 2015 fell 19 percent, Kaspersky Labs reports

9 years ago

What Can The United Airlines Hack Tell Us About IT Security?

The data breach at United Airlines could reveal a lot about hacker motivation

9 years ago

Porn Clampdown By Government Questioned

Plan to stop kids accessing smut ignores the fact that most porn websites are hosted outside the UK

9 years ago

Vendors Finding Value in Bug Bounty Programs

Bugcrowd report examines 30 months of bug bounty submissions across 166 programs, finds crowdsourced security is gaining industry-wide adoption

9 years ago

Android For Work Signs Up The World’s ‘Most Secure’ Smartphone

Silent Circle’s security-focused Blackphone 2 will be one of the first to run Google’s new business program

9 years ago

Google Roadshow To Train UK For Online Safety

Google undertakes country-wide roadshow to train Brits about online safety and security

9 years ago

ARM Splashes Cash On Israeli IoT Security Firm

Acquisition of Sansa Security will offer hardware and software-based security features for ARM's IoT chips

9 years ago

Android Security Bug Can Put Your Phone In A Coma

Vulnerability could affect up to half of the Android devices out today, Trend Micro claims

9 years ago

Dutch Bank Launches Voice-Activated Password System

ING Netherlands customers can now log in to their accounts simply by speaking

9 years ago

Three Awesome Windows 10 Security Features

Will Windows 10 be more secure than previous versions? These security features should help

9 years ago