Security

Australian PM Warns Of ‘Sophisticated’ Cyber Attack By ‘State-Based’ Actor

Prime Minister Scott Morrison reveals Australia is experiencing cyber attacks across 'a range of sectors', with China reportedly the likely…

5 years ago

Spyware Impacts Chrome Extensions, Downloaded Millions Of Times

Awake Security discover 'massive, criminal surveillance campaign' via 32 million downloads of extensions for Google's Chrome web browser

5 years ago

Former Google Boss Eric Schmidt Calls Out Huawei’s ‘Unacceptable Practices’

Eric Schmidt says Huawei does pose national security risk and has engaged in 'unacceptable acts', but the Chinese firm denies…

5 years ago

GitLab Bolsters DevSecOps With Peach Tech, Fuzzit Acquisitions

GitLab to integrate Peach Tech and Fuzzit fuzz-testing into its DevOps lifecycle tool, helping developers to catch security bugs earlier…

5 years ago

Attacks On Critical Infrastructure Now ‘More Targeted’

Study finds cyber-criminals are shifting tactics to favour multi-stage ransomware attacks that include stealing sensitive data to maximise damage and…

5 years ago

Tech Firms Pledge Child Abuse Disclosures To Blunt Anti-Encryption Drive

Strategic move? Google, Facebook, Microsoft pledge to improve and standardise annual disclosures around online child exploitation

5 years ago

Production At Honda Grinds To Halt After Second Cyber Attack

Work at Honda factories in Japan, the UK, North America, Brazil, India, Turkey and Italy has been suspended after another…

5 years ago

Apple Project Aims To Improve Password Managers

Apple's open source Password Manager Resources project includes site-specific data aimed at improving compatibility of third-party password tools

5 years ago

Apple Tracks iPhones Stolen By Looters

We are tracking you. Apple warns looters after some street protests in the United States result in the looting of…

5 years ago

Hackers Steal Data From US Nuclear Missile Contractor

Confidential data from the US military contractor that supports the Minuteman III nuclear deterrent has been stolen by hackers

5 years ago

Agents of Transformation

AppDynamics have launched a COVID-19 edition of its global research ‘The Agents of Transformation.’ The report includes data from interviews…

5 years ago

TrickBot Malware Update Makes It Harder To Detect

TrickBot information-stealing malware updated with new 'nworm' module that uses encryption and in-memory execution to hinder detection efforts

5 years ago

Is Video Conferencing Secure Enough?

The COVID-19 crisis has seen an explosion in video and teleconferencing service use. Looking into the future, if more mass…

5 years ago

Apple iPhone Exploit Allows Users To ‘Jailbreak’ Devices

Fully updated Apple devices contain the exploit that allows the first public jailbreak for Apple's iOS operating system for nearly…

5 years ago

How To Manage Virtual Teams

As businesses adapt to the 'new normal', a significant component of their organization will be virtual teams. Silicon UK discovers…

5 years ago

‘Ragnar Locker’ Ransomware Hides Inside Virtual Machine

Researchers discover attack group that deploys highly targeted ransomware running inside virtualised Windows XP instance to evade detection

5 years ago

Cryptocurrency-Mining Campaign Hits ‘Thousands’ Of Enterprises

Security researchers find attackers breaking into public-facing Windows IIS web servers to install Monero-mining malware across networks

5 years ago

GitLab Hacks Own Remote-Working Staff In Phishing Test

Company finds 20 percent of its all-remote staff responds to phishing message by exposing user credentials, raising fears about the…

5 years ago

Popular Maths Site Investigates ‘Potential Data Compromise’

Students and children at risk as more than 25 million account credentials allegedly stolen from Mathway offered for sale online

5 years ago

Microsoft Uncovers ‘Massive’ Pandemic-Themed Phishing Campaign

Scam emails use Excel spreadsheets containing Covid-19 data as a lure, then execute malicious macros that give attackers control over…

5 years ago

Securing The DARQ Future

Distributed Ledger Technologies (DLT), Artificial Intelligence (AI), Extended Reality (XR) and Quantum Computing expand (DARQ), will be the next wave…

5 years ago

Google Chrome Follows Firefox Lead With DoH Option

Three months after Firefox turned on privacy feature called DNS-over-HTTPS (DoH), Google's Chrome browser gets same feature, but only if…

5 years ago

Is Home Your Business’s New Network Security Perimeter?

Post COVID-19 could see many businesses permanently using home-based working as the norm for their enterprises. With annual reports stating…

5 years ago

Google Cloud Wins Pentagon Cyber Threat Contract

No, not the JEDI contract. Google Cloud wins contract to help the US defense department detect and respond to cyber…

5 years ago

Coronavirus: NHS Contact Tracing App Has Flaws, Aussie Researchers Warn

Security flaws in the NHS coronavirus contact-tracing app could pose risk to user privacy, as the NCSC promises to fix…

5 years ago

EasyJet Hack: Security Expert Reactions

Beware the phishing scams warn experts, as the hack of easyJet make available more valuable personal information on the dark…

5 years ago

EasyJet Admits Hack From ‘Highly Sophisticated Source’

Personal information of 9 million customers accessed in a “highly sophisticated” cyber-attack, which saw the credit card details of 2,200…

5 years ago

FBI Criticises Apple For Failing To Help Unlock iPhones

Agency says it had to develop its own tool to access two locked iPhones used by gunman who attacked Pensacola…

5 years ago

Bluetooth Standard Vulnerable To Unpatched Spoofing Attack

Researchers warn of weaknesses affecting all Bluetooth-compliant devices – just as governments roll out coronavirus apps reliant on the tech

5 years ago

Supercomputers Across Europe Shut Down After Crypto-Mining Attacks

Hackers break into academic high-performance computing clusters in Edinburgh, Germany and Switzerland to install Monero currency-mining software

5 years ago