Security

Quiz Of The Week: To USB Or Not To USB

What do you know about USB technology? Try our quiz and test yourself.

10 years ago

NCA Warns That Two In Five Brits Ignore The Cyber Crime Threat

National Crime Agency warns web users to install software updates, even on mobiles, or risk becoming the victim of cyber…

10 years ago

New Android Malware Is Spreading Through Third-Party App Markets

ESET sounds the alarm after Krysanec RAT is found piggybacking on top of its own security app

10 years ago

Cyber-Espionage Campaign Targets Former Communist Governments

An unidentified group is stealing data from ministries and embassies, military, research and education organisations

10 years ago

Kroll Ontrack Touts Data Recovery Via Cloud

Look Mum, no hands! Now, engineers at Kroll Ontrack don't require physical access to a damaged drive to undertake data…

10 years ago

UK Home To More Botnet Command And Control Servers Than Any Other Country

32 percent of known botnet C&C servers are hosted in Britain says Trend Micro, which warns of ongoing Windows XP…

10 years ago

Manchester United Ban Tablets And Laptops From Home Games

Manchester United supporters can not bring large electronic items to Old Trafford this season over security fears

10 years ago

IBM Acquires Lighthouse Security To Improve Identity Management

The deal follows the purchase of identity management specialist CrossIdeas, which was announced last last week

10 years ago

Hacker Roots Silent Circle’s Blackphone At DefCon

SIlent Circle doubts whether the hack could take place in the wild, but still thanks 'Justin Case' for his contribution…

10 years ago

US ‘Cyber Patriot’ Games Are Coming To The UK

Known as ‘Cyber Centurion’ on this side of the Atlantic, a new competition wants to prepare young students for careers…

10 years ago

Xiaomi Apologises For Unauthorised Personal Data Transmission

Xiaomi says the data transfer was necessary for its cloud messaging service but issues a fix that prevents it from…

10 years ago

Open Letter From Hackers Highlights Automobile Security Risks

Researchers are calling for support of a movement that pushes car makers to improve cyber-security in latest automobiles

10 years ago

DefCon: John McAfee Launches Complaints Website

BrownList offers anyone a chance to complain about anything, and promises to keep those complaints online until the end of…

10 years ago

Facebook Ordered To Provide Data On Underage Users

Belfast's High Court orders Facebook to disclose any data it might have on how many underage users it has in…

10 years ago

Microsoft: There Will Be No Windows 8.1 Update 2

Microsoft says there will be no major Windows 8.1 Update 2 and future upgrades will be incrementally delivered alongside security…

10 years ago

Critical WordPress Plugin Bug Was Ignored By Developers

Any website using the Custom Contact Forms plugin should apply a patch as soon as possible

10 years ago

Police Arrest Man For Running Blocked Torrent Site Proxies

PIPCU starts to “come down hard” on proxies that offer access to websites blocked in the UK, such as The…

10 years ago

Facebook Tightens Security With PrivateCore Purchase

The social network is beefing up the securtity of its servers with the purchase of a US software start-up

10 years ago

Microsoft To End Support For Older Versions Of Internet Explorer From 2016

Microsoft urges consumers and businesses to migrate to the latest version of Internet Explorer

10 years ago

Yahoo And Google To Work Together On Encrypted Email

Yahoo promises to implement end-to-end PGP encryption by 2015

10 years ago

BlackBerry Secure Work Space Receives US DoD Security Clearance For iOS And Android

iPhones, iPads and Android devices managed by BlackBerry Secure Work Space on BES 10 can be used on US defence…

10 years ago

Quiz Of The Week: Famous Hackers

What do you know about the men who became famous by breaking stuff?

10 years ago

Microsoft Tip Off Leads To Child Abuse Arrest In The US

Microsoft becomes the latest tech vendor to aid law officials in their fight against child abuse

10 years ago

Google To Rank Sites With HTTPS Encryption Higher In Search Results

Google will use encryption as a ranking criteria in an effort to encourage more sites to adopt HTTPS

10 years ago

Apple Is Latest US Firm To Be Excluded From Chinese Government Procurements

Apple becomes the latest western tech firm excluded from Chinese government procurement projects

10 years ago

New Tool Aims To Decrypt Files Lost To Cryptolocker

DecryptCryptoLocker neutralises the original 'ransomware' strain, but its derivatives still pose danger

10 years ago

US Homeland Security Contractor Warns Of ‘State-Sponsored’ Breach

A US Homeland Security contractor warns its systems have been breached in what it suspects was a “state-sponsored” attack

10 years ago

Magnitude Exploit Kit Grows In Popularity Thanks To Free Distribution Model

Magnitude creators want to be paid in compromised machines, not money

10 years ago

Chinese Anti-Trust Regulators Launch Fresh Raids On Microsoft Offices

Microsoft reportedly receives more visits from the Chinese SAIC as pursuit of Western firms continues

10 years ago

ICO Puts Legal Profession In The Dock Over Data Breaches

The ICO sounds alarm over the handling of personal data by the legal profession

10 years ago