Authentification

Facebook Blocks Insurance Firm Admiral From Using Profile Data

Is Facebook a privacy champion? Admiral banned from using FB data in order to price insurance policies

8 years ago

UK Government Pledges ‘To Strike Back’ In Cyberwar As It Invests £1.9bn In Cybersecurity

Philip Hammond outlines the government's new cybersecurity strategy and how £1.9 billion will boost defences, enable law enforcement and aid…

8 years ago

Twitter’s Sponsored Tweets Used For Credit Card Phishing

Malwarebytes finds a scam masquerading under the offer of Twitter verification

8 years ago

Google’s AI Neural Networks Learn To Create Their Own Encryption

Two neural nets were created to communicate securely while a third tried to crack their inhuman cipher messages

8 years ago

Data Breach Exposes 550,000 Australian Red Cross Blood Service Donors

Security flaws on the organisation’s website led to personal data bleeding out after a basic hack attack

8 years ago

Microsoft Azure IoT Protects Against Cyber Attacks With Expert-Driven Security Program

Third-party security auditors will be brought in to help Microsoft Azure customers secure their Internet of Things deployments

8 years ago

Massive Cyber-Attack Shows Risk Of Poor Security On Network Nodes

ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas…

8 years ago

What Makes Ransomware the Worst Type of Malware

In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in…

8 years ago

Oracle Fixes 253 Security Flaws In October Update

Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.

8 years ago

Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild

The bug affects most versions of Linux potentially exposing huge numbers of machines to hackers

8 years ago

Selfie Stealing Android Trojan Discovered By McAfee Labs

Tweaked Acecard trojan aims to trick gullible Android users into sending selfies and photos of their IDs

8 years ago

Foxconn Firmware Flaw Leaves Android Devices Vulnerable To USB Hack

Dubbed Pork Explosion the flaw allows Android security protocols to be bypassed

8 years ago

Symantec Spots Student Scam Powered By Ascesso Trojan

Scammers are trying to trick students into paying for application to the US student loan forgiveness programme

8 years ago

What New Update Process For Windows 7 And 8.1 Means for Enterprises

ANALYSIS: Beginning this week, all updates will be roll-ups, with complete cumulative updates to begin in 2017, eliminating the ability…

8 years ago

Facebook Twitter & Instagram Ban Data Monitoring App Geofeedia

New privacy row as social networking sites halt access by data gathering app used by law enforcement

8 years ago

US Military Looks To Blockchain To Secure Weapon Data And Nukes

Is Blockchain a possible solution for securing weapons data for the US military, including its nuclear capabilities?

8 years ago

Persistent Warnings Are Causing ‘Security Fatigue’

People are becoming weary of constant security advice and businesses could pay the price for poor decisions, a report has…

8 years ago

IoT And The Enterprise World Must Put Cyber Security At The Forefront Warn Experts

IP Expo 2016: Sophos, Kaspersky and Trend Micro talk future threats from IoT, Hired cyber criminals, and security education

8 years ago

Federal Agencies Working With States to Guard Voter Data Security

Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in…

8 years ago

Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks

ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security…

8 years ago

Yahoo Hack: Eastern European Blackhats Responsible For The Massive Data Breach

Cyber security firm InfoArmor says criminal hackers for hire are to blame for the Yahoo hack in 2014

8 years ago

Apple Harvests iMessage Logs And Could Share Them With The Police

Questions are raised over how private Apple's services really are.

8 years ago

MarsJoke Ransomware Targets US Government And Education Institutions

Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims

8 years ago

DDoS Attacks Heading Toward 1-Terabit Record

ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not…

8 years ago

Yahoo, LinkedIn, Apple iCloud: 10 Big Data Breaches

Data breaches from hack attacks continue to get bigger and bolder but which of these do you remember?

8 years ago

What Should You Do After Massive Yahoo Hack?

ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next

8 years ago

Sky And BT Email Users Are Caught Up In Yahoo Password Hack

Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach

8 years ago

Latest iOS 10 Security Features Help Apple’s Business Case

ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according…

8 years ago

Apple macOS Sierra Fixes 68 Vulnerabilities

macOS Sierra isn't just a pretty face. Apple has patched quite a few security flaws, including one that affects Docker

8 years ago