Authentification

Android Scam Call And SMS Security Is Undone By HTML Exploiting Malware

Android's built-in protection which flags warnings about apps trying to send premium rate messages without user consent can be manipulated…

8 years ago

Apple iPhone 5C Password Lock ‘Defeated’ With £75 Hardware Hack

A Cambridge computer scientist claims has achieved an iPhone 5C hack the FBI struggled to do with $1 million

8 years ago

Microsoft Isn’t Patching ‘Significant’ Windows Safe Mode Flaw

Researchers say Windows 10 Safe Mode flaw is easy to exploit but Microsoft doesn't acknowledge it as a primary threat

8 years ago

One Year Post-IPO, Sophos Extending Its Security Platform

Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016

8 years ago

GDS Aims To Boost Gov.UK Verify Adoption With Local Council Pilot

Government Digital Service will continue to push is government-as-a-platform plans beyond Whitehall but cloud challenges await

8 years ago

Google Patches 55 Android Vulnerabilities in September Update

More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for…

8 years ago

Inteno Router Flaw Opens Up Home Networks To Hackers

F-Secure has discovered a critical flaw in the way some Inteno routers update their firmware leaving them vulnerable to malware

8 years ago

Linux Networking Flaw Allows Attacker To Trick Safety Mechanism

A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?

8 years ago

Linux Trojan Written In Go Mines For Cryptocurrencies

'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software

8 years ago

FTC Commissioner Looking For Hackers’ Help With Consumer Privacy

FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…

8 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

8 years ago

Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil

Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games

8 years ago

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

8 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Google Releases Customer-Supplied Encryption Keys For Cloud

Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

8 years ago

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

8 years ago

‘Apple’s Stagefright’: iOS And Mac Users Urged To Update Immediately

iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…

8 years ago

HTTpoxy Flaw Re-emerges After 15 Years And Gets Fixed

After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…

8 years ago

Researchers Warn Of Rio 2016 Malware As Olympic Searches Return Threats

Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised

8 years ago

Visa: Most People Back Biometric Payments

Majority of people want to use biometrics when making payments, with fingerprints the favoured option

8 years ago

CryptoDrop Promises To Stop Ransomware In Its Tracks

University of Florida researchers say the answer to stopping ransomware is to let it onto your system first

8 years ago

Avast Buys AVG For £1bn In Bid To Become Czech IoT Security Giant

Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices

8 years ago

Firmware Flaw Affects Lenovo ThinkPads, Other PC Makers’ Hardware

ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…

8 years ago

Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?

Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…

8 years ago

ICO: Future UK Data Protection Laws Must Equal Those Of EU

Safe Habour advice. British data protection act should be used when transferring data to US, says ICO

8 years ago