Authentification

MobileIron CEO: Windows 10 Lets Us Manage PCs Like Mobiles

INTERVIEW: MobileIron CEO Barry Mainz tells Silicon about PC management, the rise of IoT and why it is better equipped…

8 years ago

KFC Website Hack Leaks Customer Data

Clucking Hell: Another data breach shows online security needs some cooking

8 years ago

Firmware Flaw Leaves Netgear Routers Vulnerable To Hacker Takover

Hackers can exploit a command injection flaw to execute malicious code on Netgear routers

8 years ago

IBM Watson for Cyber Security Expands With Beta Launch

40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…

8 years ago

Fake News Campaigns to Increase in Frequency, Security Experts Say

ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…

8 years ago

Credit Cards Hacked In Six Seconds Using Distributed Technique

Visa's online payment system fails to pick up on multiple invalid credit card attempts across multiple websites

8 years ago

MAD Concept Of Deterrence Doesn’t Apply In World Of Cyber War

ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…

8 years ago

Up To 26,500 National Lottery Online Accounts Are Breached

National Lottery and experts suggest accounts breached by reusing compromised credentials

8 years ago

Black Friday, Cyber Monday Bring Open Season for Cyber-Criminals

ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…

8 years ago

One In Four Wi-Fi Hotspots Ripe For Hack Attacks

Cyber security firm Kaspersky finds that large amounts of Wi-Fi hotspots still lack solid security

8 years ago

Election Recount Unlikely To Reveal Evidence Of Vote System Hacking

ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…

8 years ago

Twitter Touts Anti-Snooping Developer Agenda

Twitter will block developers who abuse the use of its APIs and Gnip data for snooping purposes

8 years ago

How To Protect The Encryption Keys To Your Kingdom

ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…

8 years ago

Android Fake Email App Trojan Takes Aim At German Banks

Android malware appears to be increasingly tailored to target specific banking services

8 years ago

Qualcomm Bug Bounty Offers Up To £12,000 For Snapdragon Flaws

Qualcomm is offering up to $15,000, approximately £12,000, to people who spot bugs in its modems and processors.

8 years ago

Siri Bug Bypasses Apple iPhone And iPad Password Protection

A flaw in Apple's virtual assistant enables dexterous hackers to gain access to an iOS device's contacts and photos

8 years ago

Snooper’s Charter 2.0 Is Set To Become Law As Lords Pass Controversial IP Bill

ISPs set to be required to keep your internet search history on record for at least a year in order…

8 years ago

Apple ‘Sends iPhone Call History To iCloud’

Law enforcement could get their hands on call data if it is sent to iCloud for 'no reason', claims Russian…

8 years ago

Symantec: Hackers Are Becoming Expert IP Hunting Professionals

Fujitsu Forum 2016: Cyber crime can now be considered a professional, targeted business, according to Symantec

8 years ago

DocuSign Opens Cybersecurity Centre In Dublin

DocuSign continues European expansion with cybersecurity investment in the Irish capital

8 years ago

Philips Hue Smart Lightbulbs Hack Can Spread IoT Worm Like Wildfire

Smart lighting may be the next Internet of Things (IoT) attack vector, thanks to hackable Philips Hue smart lightbulbs.

8 years ago

Yahoo Investigates Cookie Powered Password Bypass Hack

The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny

8 years ago

Apple iOS 10.2 Public Beta Strengthens iTunes Backup Encryption

The Cupertino company boasts backup encryption that will take 1,000 years to hack

8 years ago

Splunk: Machine Data Could Be The Key To Tackling Cyber Threats

INTERVIEW: Splunk's security evangelist Matthias Maier talk bolstering cyber defences with machine data

8 years ago

Darktrace: Machine Learning Will Filter Through The Noise Of Cyber Security

INTERVIEW: Machine learning can help filter the increasing noise on complex IT networks to spot the emerging cyber threats that…

8 years ago

LastPass Offers Password Management Tool For Free

Forgetful people now have free access to the password manager

8 years ago

Yandex Is The First Russian Tech Firm To Join The CVE

The company wants to be transparent in how it discovers and protects against cyber security flaws

8 years ago

National Cyber Security Centre Head: Fearmongering Must Be Replaced With Facts

National Cyber Security Centre chief Dr Ian Levy wants an empirical, transparent approach to cybersecurity policy - not hysteria

8 years ago