Security

Card Scammers Hack Top Restaurants In POS Attack

A list of well-known restaurants across the US are amongst those affected by the latest mass point-of-sale breach

8 years ago

Ubuntu Linux Falls On Day 1 Of Pwn2Own Hacking Competition

First day of Trend Micro-sponsored Pwn2Own competition awards $233,000 to security researchers for exploiting software

8 years ago

McDonald’s Compromised Twitter Account Posts Anti-Trump Tweet

The fast-food firm claims its Twitter accounts was compromised

8 years ago

Two Russian Spies Indicted By US Justice Department For Orchestrating Yahoo Hack

The Kremlin has denied the accusations that FSB agents facilitated one of the largest data breaches in history

8 years ago

ABTA Data Breach Impacts 43,000 Holidaymakers

ABTA says passwords were encrypted, mitigating risk, following attack on third party hosting provider

8 years ago

WhatsApp & Telegram Patch ‘Severe’ Vulnerabilities

'Severe vulnerability' found with encrypted chat apps that could allow attackers to take complete control of user accounts

8 years ago

Unsecured Apple, Android Smartphones Are Major Security Threats

ANALYSIS: Apple & Android smartphones that lack augmented security measures leave high-priority hacking targets, such as President Donald Trump, vulnerable

8 years ago

Google Allo ‘Leaks’ Previous Searches In Conversations

Google works to fix error that saw previous searches shared in group chats via AI-assisted smart messaging app Allo

8 years ago

Patch Tuesday: Delayed Update Arrives As Microsoft Signals End Of Windows Vista

Welcome back. Delayed Patch Tuesday arrives for March and it is a whooper, with 139 vulnerability fixes

8 years ago

High Profile Twitter Accounts Hacked By Pro Turkish Supporters

Twitter accounts held by notable individuals and organisations hacked and defaced with pro Turkish content

8 years ago

Cyber Security Cannot Be An Afterthought In Smart Buildings

Cloud Expo 2017: Stuart Higgins, head of smart cities and IoT at Cisco champions smart building security from the get-go

8 years ago

A United Front: The Issue Of Threat Data Sharing In Cyber Security

IN DEPTH: The sharing of threat data is a key talking point within the world of cyber security, as we…

8 years ago

SAP Rushes To Patch Cyber Security Flaws In HANA

Luckily, the flaws were fixed before hackers were able to find and exploit them

8 years ago

Smart Sex Toy Firm Forced To Pay £3 Million In Data-Tracking Lawsuit

Security vulnerabilities and secret data tracking result in significant financial hit for Canadian sex toy firm

8 years ago

NCSC: Personal Gadgets At Risk From Ransomware

The NCSC and the NCA have warned that smartphones, televisions and fitness trackers are the next likely targets for ransomware…

8 years ago

Nintendo Switch Hacked Via Built-In WebKit Exploit

The console has only been out for two weeks and already has hackers cracking it

8 years ago

US Military Suffers Massive Leak Of Confidential Air Force Data

The leaked military documents have been described as the "holy grail" for foreign spies

8 years ago

Facebook Policy Bans Use Of Data For ‘Surveillance’

Facebook now restricts developers from using data for surveillance purposes, after police were found to be using the data to…

8 years ago

Imeij Botnet Malware Targets IoT Cameras

The Imeij malware exploits a bug in AVTech video surveillance equipment first disclosed last year, but never patched by the…

8 years ago

Security Breach Sees Thousands Of Welsh NHS Staff Data Stolen

The data was swiped form a server being operated by an external contractor

8 years ago

Android Mobile Malware: 38 Devices Have Pre-Installed Malicious Software

Check Point found malware lurking on mobiles form a major tech firm and a telecoms company

8 years ago

TalkTalk Bans TeamViewer Remote Access Tool To Combat Scammers

The move is aimed at tightening security, but users slated the ISP for giving them no warning

8 years ago

GCHQ Warns Political Parties Of Russian Cyber Threat To 2020 General Election

GCHQ warns that Russian tempering during US Presidential election is likely to happen again

8 years ago

Leak Of CIA Hacking Secrets Serves As Alert To Close Security Gaps

ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a…

8 years ago

WikiLeaks Will Work With Manufacturers To Develop ‘Fixes’ For CIA Hacking Tools

The whistleblowing site will publish 'additional documents' after fixes have been pushed out to citizens

8 years ago

Criminals Making Greater Use Of Tech, Warns Europol

Organised crime study reveals that nearly all criminal gangs are now using some form of technology

8 years ago

WordPress 4.7.3 Updates For Six Security Issues

The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws

8 years ago

Wikileaks Documents Claim CIA Can Hack Samsung TVs, iPhones and iPads

Watching TV but who is watching you? CIA allegedly uses Samsung TVs to spy on citizens

8 years ago

Amazon Hands Over Contested Echo Data In Murder Trial

Amazon has provided prosecutors access to Echo recordings in the latest case to raise questions on the privacy implications of…

8 years ago

StoneDrill Wiper Malware Moving To European Targets

Shamoon malware appears to have evolved into a browser-lurking cyber threat

8 years ago