Authentification

RSA 2017: Four Steps To Staying Secure In ‘The Age Of Access’

Can focusing on access and identity provide a security boost to your business?

8 years ago

WordPress Security Vulnerability Leads To 1.5 Million Web Pages Being Defaced

WordPress rushed to fix the flaw but hackers speedily exploited the flaw

8 years ago

Executives And IT Managers Disagree On Who Is Responsible For Cybersecurity

BAE survey says that unless there is more coordination between executives and IT departments, hackers will find holes to exploit

8 years ago

Security Firm Trend Micro’s Blog Falls Victim To Content Spoofing Attack

Trend Micro confirms a content spoofing vulnerability allowed fake articles onto its blog and says firms should respond honestly and…

8 years ago

Kaspersky Discovers New Malware Designed To Stealthily Steal Data

ANALYSIS: Kaspersky Lab has discovered a new strain of malware that hides in memory and trusted applications while it stealthily…

8 years ago

NSA Contractor Indicted For Stealing 50TB Of Classified Data

Booz Allen contractor Harold Martin could be the next Edward Snowden

8 years ago

Valve Rushes To Patch XSS Flaw In Steam

The flaw could allow hackers to conduct phishing attacks and spread malware

8 years ago

76 Popular iOS Apps Vulnerable To Man-In-The-Middle-Attacks

Scanning has revealed that popular apps could have their data intercepted by hackers

8 years ago

LogicHub Security Intelligence Automation Platform Debuts

Startup emerges from stealth with new funding and the promise of improving threat detection by automating activities that typically require…

8 years ago

Netgear Router Vulnerability Leaves Your Wi-Fi Network Exposed To Attack

Up to 31 Netgear rotuers impacted by remote access flaw that could leave your network a node in a botnet

8 years ago

How To Avoid Fake Apps And Keep Your Online Data Private

We're all internet users, so we all must know how to spot fake apps and how to keep our own…

8 years ago

Google Cracks Down On Web Security With Own Own Root Certificate Authority

Google takes another step towards driving the adoption of HTTPS

8 years ago

Mozilla Highlights Insecure HTTP Websites In Firefox 51

Unsecured websites will display a lock with a red strike through it

8 years ago

Apple Issues Security Updates For iPhone, Mac & Apple Watch

Two dangerous kernel bugs highlighted by Google's Project Zero have been squashed

8 years ago

‘Prank’ Emoji iMessage Is Crashing iPhones And iPads

Another iMessage bug has been found, affecting most versions of iOS

8 years ago

Hackers Lovin’ It As McDonald’s Site Vulnerable To Phishing Attack

Shoddy password practices leave the door open for hackers to take away customer details

8 years ago

Patch Tuesday: Microsoft To Stop Publishing Security Bulletins

Patch Tuesday is changing: From February, Microsoft will communicate security updates via a dynamic online portal rather than a static…

8 years ago

Hacker Group ‘ShadowBrokers’ Release NSA Exploits After Auction Fails

"ShadowBrokers" releases 61 files said to contain exploit tools used by the NSA, which could fuel a race between attackers…

8 years ago

WhatsApp Denies It Has Compromised Encryption With ‘Backdoor’

UPDATED: Researcher says WhatsApp can reissue encryption keys for offline devices, compromising privacy. WhatsApp says there is no backdoor and…

8 years ago

Rudy Giuliani Is To Head Donald Trump’s Cybersecurity Taskforce

Former major of New York Giuliani accepts position as leader of Donald Trump's new cybersecurity team

8 years ago

Swiss-US Privacy Shield Mimics EU Data Sharing Arrangement

Switzerland's Privacy Shield data transfer agreement with the US is similar to the EU, aiding multinationals and offering potential Brexit…

8 years ago

LinkedIn And eBay Founders Throw £16.5m At AI Ethics Fund

The Ethics and Governance of Artificial Intelligence Fund will explore the development of AI from a non-technical viewpoint

8 years ago

DHS Designates Election Machines, Systems As ‘Critical Infrastructure’

Individual states will still have oversight and control over their election systems, but the move makes a statement “domestically and…

8 years ago

FTC Suit Against D-Link Warns All IoT Device Makers To Boost Security

ANALYSIS: Despite claims about advanced security, the FTC says D-Link hard-coded login credentials leaving encryption keys unprotected and publicly exposed

8 years ago

Google Patches Android For 90 Vulnerabilities In January Update

Google starts the new year with another large security update for Android, once again patching mediaserver, Qualcomm and Linux kernel…

8 years ago

Intel & BitDefender Target Smart Home Security

CES 2017: Lock it down. Security players tout offerings to secure smart homes of the future

8 years ago

Expect 2017 Cyber-Attacks To Far Surpass 2016 In Damage, Frequency

ANALYSIS: Constant bad news about Russian hacking and the increasing prevalence of ransomware made 2016 an IT security disaster... but…

8 years ago

Security Vulnerabilities Found In Airline Entertainment Systems

IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access

8 years ago