Security

Android Fingerprint Readers Are Also A Security Risk

It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find

9 years ago

Texas Drone Uncovers Scale Of IoT Security Worries

Austin-based drone discovers details of 1,600 IoT devices in just a few neighbourhoods

9 years ago

Samsung, Google Nexus Devices To Get Monthly Android Security Updates

Smartphones and tablets will be among the first to benefit from incremental updates to Android

9 years ago

Beware – Your Smart Home Might Be A Massive Security Risk

Tripwire survey finds zero-day vulnerabilities in many of the leading smart home hubs

9 years ago

FBI Called In To Investigate Hillary Clinton Email Set-Up

FBI agents are looking into the security of the presidential hopeful’s private account

9 years ago

BIND Flaw Opens Door To Hacker Attacks On DNS

Patch now! BIND flaw is being exploited by hackers and websites can be taken offline, researchers warn

9 years ago

Employees Just Don’t Care About Keeping Company Data Safe With BYOD

Kaspersky survey finds only one in ten workers bothering to keep work files safe from cyber attack

9 years ago

Two Major Mac OS X Vulnerabilities Bring Apple Security Approach Under Scrutiny

Researchers find exploit for previously known vulnerability and create firmware worm that can spread without physical network

9 years ago

Q&A With Black Hat, DEF CON Founder Jeff Moss

Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always…

9 years ago

Yahoo Ad Network Spreads Malware – Again

The latest malicious ad campaign follows an incident that affected Yahoo and AOL last year

9 years ago

Microsoft Tests Quantum Computer-Proof Web Encryption

New system may allow the web's SSL systems to fend off attacks by advanced quantum computers

9 years ago

How Finance Firms Can Reduce Data Security Risk

IT outsourcing and managed services specialist, Advanced 365, offers its top tips on defending against new cyber threats

9 years ago

Could Your Phone’s Battery Be Spying On You?

Researchers reveal that a flaw in HTML5 API can be used to track users across the web

9 years ago

How To Protect Your Business From A DDoS Attack

Margee Abrams, security services product marketing at Neustar, a real-time information and analytics firm, says criminals will steal from you…

9 years ago

Leaked NSA Map Details China ‘Cyber-Espionage’ Attacks

A secret map pinpoints successful attacks on companies including Google and Lockheed Martin

9 years ago

NatWest Online Banking Affected By DDoS Attack

Friday's attack marks the fifth time in the past three years that NatWest's online banking service has been hit by…

9 years ago

Mobile Malware ‘Grows Almost Three-Fold’ In Just Three Months

However the total number of global threats in Q2 2015 fell 19 percent, Kaspersky Labs reports

9 years ago

What Can The United Airlines Hack Tell Us About IT Security?

The data breach at United Airlines could reveal a lot about hacker motivation

9 years ago

Porn Clampdown By Government Questioned

Plan to stop kids accessing smut ignores the fact that most porn websites are hosted outside the UK

9 years ago

Vendors Finding Value in Bug Bounty Programs

Bugcrowd report examines 30 months of bug bounty submissions across 166 programs, finds crowdsourced security is gaining industry-wide adoption

9 years ago

Android For Work Signs Up The World’s ‘Most Secure’ Smartphone

Silent Circle’s security-focused Blackphone 2 will be one of the first to run Google’s new business program

9 years ago

Google Roadshow To Train UK For Online Safety

Google undertakes country-wide roadshow to train Brits about online safety and security

9 years ago

ARM Splashes Cash On Israeli IoT Security Firm

Acquisition of Sansa Security will offer hardware and software-based security features for ARM's IoT chips

9 years ago

Android Security Bug Can Put Your Phone In A Coma

Vulnerability could affect up to half of the Android devices out today, Trend Micro claims

9 years ago

Dutch Bank Launches Voice-Activated Password System

ING Netherlands customers can now log in to their accounts simply by speaking

9 years ago

Three Awesome Windows 10 Security Features

Will Windows 10 be more secure than previous versions? These security features should help

9 years ago

Cyber Attacks Are Daily Reality, Admit Executives

Dire threat landscape...corporate executives admit cyberattacks occur daily or weekly

9 years ago

Senseless Jane Austen Virus May Offend Your Sensibilities

Computer hackers are hiding malicious code in passages of text from some of the world's greatest novels

9 years ago

Google To Let Cloud Customers Use Own Keys To Encrypt Data

Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says

9 years ago

Researchers Demo Tor Network Vulnerability

We are protecting Internet users anonymity researchers say, after successfully attacking Tor network

9 years ago