Security

Classified US Army Data Found Unprotected On AWS Server

Top secret army data found online after virtual image of hard disk was left on an AWS server

7 years ago

SWIFT Warns Banks Of Increasing Digital Robberies

Hackers are using increasingly sophisticated tools and techniques for attacks against banks, SWIFT warns

7 years ago

Apple Fixes Serious MacOS Password Bug

UPDATED: MacOS High Sierra has a serious flaw with admin privileges, as researcher criticised for public disclosure

7 years ago

Facebook Bug Allowed User To Delete Any Image

A flaw in a new polling feature could have been manipulated by a malicious user to delete images of their…

7 years ago

McAfee To Buy Skyhigh Networks In Cloud Cybersecurity Push

McAfee's first major acquisition as an independent security firm is Skyhigh Networks

7 years ago

Government Urged To Launch Blockchain-Based ID Assurance Overhaul

Blockchain could be used to give citizens control over how their identity information is shared with public services, argues the…

7 years ago

Imgur Breach Exposes Emails, Passwords Of 1.7 Million Users

The passwords were encrypted but may have been cracked using brute-force techniques, says Imgur's chief operating officer

7 years ago

Mozilla To Build Breach Notifications Into Firefox Browser

A planned feature, currently in early testing, would alert users when they use a site that's recently been affected by…

7 years ago

‘Concerned’ UK Regulators Look Into Uber’s Hidden Data Breach

ICO and NCSC are looking into the scale of the Uber hack before they take next steps

7 years ago

‘Hundreds’ Of Websites Track User Keystrokes

Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality

7 years ago

Security Panel: What On Earth Was Uber Thinking?

Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?

7 years ago

US Government Warns Businesses Over Intel Management Engine Flaw

Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors

7 years ago

Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen

New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…

7 years ago

Interpol & Cisco To Combat Cyber Crime At Singapore Nerve Centre

Cisco is to contribute its world-spanning cyber-threat analysis to help battle increasingly sophisticated internet threats

7 years ago

Five Steps To Keep North Korean Hackers Out Of Your Network

ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…

7 years ago

AWS ‘Secret Region’ Serves US Government Customers

AWS re:Invent 2017: New government-focused region complements an existing deal that gives US intelligence agencies access to air-gapped cloud infrastructure

7 years ago

CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates

CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software

7 years ago

BankBot Malware Slips Into Google Play Yet Again

The banking Trojan, which imitates real banking apps to steal users' login details, has been reported on Google Play several…

7 years ago

Harvard University Recommends How To Stop Election Hackers

The new Harvard programme is intended to put local and national election campaigns on guard against nation state hacking attacks

7 years ago

IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security

At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…

7 years ago

IBM Quad9 DNS Service Offers Rogue Site Protection

Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection

7 years ago

North Korea Getting Ready Wage A Global Cyber War, Experts Say

ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…

7 years ago

Cash Converters Admits Data Breach After Website Hack

Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters

7 years ago

Debate: Should We Be Concerned About IoT Security Or Not?

The consensus is that IoT is a security threat. But should we really be concerned?

7 years ago

Trump Clarifies US Government Rules For Cyber Security Flaw Disclosures

New rules governing how US agencies disclose cyber security flaws, as the FCC readies net neutrality reversal

7 years ago

Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack

Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…

7 years ago

MIT Helping To Define New Model To Restore Trust In Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…

7 years ago

ESET Detects More Malicious Apps On Google Play

Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan

7 years ago

Patch Tuesday: Microsoft’s 53 Vulnerabilities Surpassed By Adobe Fixes

No zero-day vulnerabilities this month, but still a moderate number of patches from Microsoft

7 years ago