Security

Plastic Surgery Photos Published After Clinic Hack

Personal surgical pictures of British citizens among thousands published after Lithuanian clinic hack

8 years ago

Chipotle Breach Exposes Continued Point-of-Sale Cyber-Security Risks

ANALYSIS: Chipotle is the latest victim of Point-of-Sale malware that steals credit card information, demonstrating the continued risks that face…

8 years ago

IBM, Cisco Buddy Up For Enterprise Security Push

Making the world a safer place...IBM and Cisco team up to share threat data and carry out joint research

8 years ago

ShadowBrokers Hacker Group To Publish More NSA Code

New batch of stolen code to be auctioned by hacker group, despite earlier pledge to shut down operation

8 years ago

Spain’s Biggest Banks Back Red Lyra Blockchain Initiative

Companies will be able to use the network to securely validate services and identities

8 years ago

Researchers Suggest Windows XP Was Immune To WannaCry Virus

Blue screens of death may have been the worst-case scenario for Windows XP devices

8 years ago

Hackers Hijack Digital Billboard In Liverpool Shopping Centre

The billboard was turned off quickly, but not before pictures of the hack made their way online

8 years ago

Judy Malware Infects Up To 36.5m Android Devices

Cyber security firm Check Point reckons it could be the biggest malvertising campaign to hit Google Play

8 years ago

Wikipedia Encryption ‘Has Decreased Censorship’ Thanks To HTTPS

Wikipedia's move to encrypt the entire site has led countries to take a more hands-off approach with regard to censorship,…

8 years ago

WannaCry Ransom Note ‘Written By Chinese Speaker’

Researchers have found a linguistic link between WannaCry's ransom notes and the language used in southern China, Taiwan or Singapore

8 years ago

China To Implement Restrictive Data Security Law This Week

Foreign companies have argued the Cyber Security Law (CSL) will make it much more difficult for them to do business…

8 years ago

Researchers Demonstrate Android ‘Cloak And Dagger’ Attacks

The attacks use 'design shortcomings' in Android to silently take over devices and steal credentials, say Georgia Tech and UC…

8 years ago

US ‘Considers’ Banning Laptops From All International Flights

Homeland security secretary John Kelly says US plans to 'raise the bar' for aviation security using new technologies

8 years ago

Tech Quiz: The Week In Review (26 May)

Have you been paying attention to this week’s IT and tech news? Then try our quiz!

8 years ago

Pacemaker Code ‘Contains 8,000 Vulnerabilities’

Researcher warns of troubling security vulnerabilities with pacemaker devices

8 years ago

Theresa May Urges G7 To Take Action Against Online Extremism

Fight against Isis "moving from the battlefield to the internet", Prime Minister to tell G7

8 years ago

Synopsys Questions Cyber Safety Of Medical Devices

Question marks over the safety of medical kit has been raised again as study finds widespread medical complacency

8 years ago

WannaCry Wallops Russian Post, Highlighting The Risk Of Legacy IT

Russian Post denies it has been infected despite tip-offs by postal workers

8 years ago

VLC & Kodi Subtitle Vulnerability Could Give Hackers Control Of 200M Devices

Security researchers warn of a subtitle vulnerability that affects VLC, Kodi and other popular media software

8 years ago

Samba Vulnerability Could Usher In Another WannaCry Worm

The security hole could affect thousands upon thousands of Linux and Unix based machines

8 years ago

NSA Says New Encryption Standards Needed To Resist Quantum Computing

ANALYSIS: Quantum computing's potential to crack encryption worries the NSA, so it's developing standards and strategies for a post-quantum world

8 years ago

Citrix Analytics Service To Tackle Insider Threats

Security play part of a number of product announcements from cloud specialist Citrix

8 years ago

Microsoft Will Snap-Up Cyber Security Firm Hexadite For £77m

Redmond will likely use the acquisition to boost AI-based security in its software portfolio

8 years ago

Biometric Bypasses Highlights Necessity For AI Smarts In Security

OPINION: Biometric hacking could pave the way for smarter AI-centric security

8 years ago

Government Wants Power To Demand Tech Giants Release Encrypted Data

The Technical Capability Notices are to be submitted to ministers for approval

8 years ago

Samsung Galaxy S8 Iris Scanner Tricked By Chaos Computer Club Hacker Group

Chaos Computer Club once again demonstrate how biometric security is far from infallible

8 years ago

Cisco Threat Defense Service Looks To Secure IoT Devices

Security platform focuses on segmenting connected devices to help defend against growing IoT cyber threats

8 years ago

Netgear Routers Now Collecting Data On Users’ Networks

Users must opt out of the data collection, which includes the IP and MAC addresses of devices connected to the…

8 years ago

ENISA Position Paper Pushes ‘Trust Label’ For IoT Devices

ENISA is pushing forward with a proposed scheme that would mandate a basic level of security for all Internet-connected devices

8 years ago

Android Malware Used To Rob Russian Bank Customers

The Cron hacking gang used malicious apps and software to infect a million Android smartphones

8 years ago