Security

Computers & Car Electronics Fried By USB Attack

Laptops, smartphones, gaming consoles and in-car displays are amongst the systems vulnerable to the USB-based electrical shock attack

8 years ago

MAD Concept Of Deterrence Doesn’t Apply In World Of Cyber War

ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…

8 years ago

Police Ambush Criminal To Bypass iPhone Security

How to get around the problem of a locked smartphone? Just ambush the criminal when he is using it. Simples

8 years ago

AWS Shield To Safeguard Web Apps From DDoS Nastiness

Amazon introduces AWS Shield managed service to protect against crippling DDoS attacks

8 years ago

Talk Talk And Post Office Broadband Taken Offline After Mirai Botnet Hack Attack

Mirai botnet strikes again, attacking routers and cutting-off broadband

8 years ago

Europol Terror Data Found On Unsecured Network Drive

Red faces at Euro cops after sensitive terror data is found online by Dutch TV programme

8 years ago

Million Google Accounts Hacked by ‘Gooligan’ Android Malware

Android malware has compromised more than one million Google accounts, warns Check Point

8 years ago

ICO Launches Probe After National Lottery Compromise

ICO begins investigation after Camelot detected 'suspicious activity' on player online accounts earlier this week

8 years ago

Up To 26,500 National Lottery Online Accounts Are Breached

National Lottery and experts suggest accounts breached by reusing compromised credentials

8 years ago

FBI ‘Hacked 8,700 Users’ In Tor Sting

Court documents reveal US investigators hacked thousands of suspects' computers around the world

8 years ago

Black Friday, Cyber Monday Bring Open Season for Cyber-Criminals

ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…

8 years ago

‘Snooper’s Charter’ Repeal Petition To Be Considered By Parliament

The petition is to be considered for parliamentary debate after receiving more than 130,000 signatures

8 years ago

Hackers ‘Can Eavesdrop Via Earphones’ By Re-Working Built-In Jacks

Attackers can record sound from hacked systems, even when microphones are muted, switched off or unplugged, finds a study

8 years ago

One In Four Wi-Fi Hotspots Ripe For Hack Attacks

Cyber security firm Kaspersky finds that large amounts of Wi-Fi hotspots still lack solid security

8 years ago

Election Recount Unlikely To Reveal Evidence Of Vote System Hacking

ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…

8 years ago

Ask Search Bar Adware Exploited By Malicious Actor To Deliver Malware

Malicious actors have been found to be using the Ask search bar software to distribute malware of its users machines

8 years ago

San Francisco Public Transport Hit By Ransomware Attack

Passengers ride for free after ransomware shuts down Muni staff computers in San Francisco

8 years ago

European Commission Victim Of “Large Scale” Cyberattack

The EC has passed details of the attack to the EU’s cyber emergency response team

8 years ago

US Navy Confirms Sailor Data Leak From Compromised Laptop

Call Agent Gibbs. Personal information on more than 130,000 US sailors compromised after HPE laptop breach

8 years ago

Bletchley Park To Host ‘Codebreakers’ Cybersecurity School

Winston Churchill's top secret World War two installation to teach cybersecurity skills to next generation

8 years ago

NatWest Warns 600,000 Customers Over Three Hack

Natwest has contacted customers it believes could have been affected by the Three data breach

8 years ago

Twitter Touts Anti-Snooping Developer Agenda

Twitter will block developers who abuse the use of its APIs and Gnip data for snooping purposes

8 years ago

Apple iPhone Users Beware Of ‘Prank’ Video

Another iOS flaw...seemingly innocent video crashes all Apple iPhones, forcing hard reboot

8 years ago

Deliveroo Customer Accounts Are ‘Compromised’

Customer accounts hacked but Deliveroo denies breach of its systems and urges customers to improve their passwords

8 years ago

How To Protect The Encryption Keys To Your Kingdom

ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…

8 years ago

NHS Royal Free London Signs Five-Year Deal With Google’s DeepMind

The revised deal for DeepMind's Streams app still gives it access to millions of patients' data going back years

8 years ago

Siemens Patches CCTV Camera Hijacking Bug

The vulnerability could allow network-based attackers to take control of IP-based CCTV cameras

8 years ago

Data Protection Breach Cases Set To Soar With GDPR Introduction

Legal experts expect disputes related to privacy or data breaches to become much more common in the next five years

8 years ago

Cobalt Gang Makes ATMs Across Europe Spew Cash

The 'touchless jackpot' technique uses hacked bank networks to compromise teller machines

8 years ago

Android Fake Email App Trojan Takes Aim At German Banks

Android malware appears to be increasingly tailored to target specific banking services

8 years ago