Is Facebook a privacy champion? Admiral banned from using FB data in order to price insurance policies
News Authentification
UK Government Pledges ‘To Strike Back’ In Cyberwar As It Invests £1.9bn In Cybersecurity
Philip Hammond outlines the government's new cybersecurity strategy and how £1.9 billion will boost defences, enable law enforcement and aid country
Twitter’s Sponsored Tweets Used For Credit Card Phishing
Malwarebytes finds a scam masquerading under the offer of Twitter verification
Google’s AI Neural Networks Learn To Create Their Own Encryption
Two neural nets were created to communicate securely while a third tried to crack their inhuman cipher messages
Data Breach Exposes 550,000 Australian Red Cross Blood Service Donors
Security flaws on the organisation’s website led to personal data bleeding out after a basic hack attack
Microsoft Azure IoT Protects Against Cyber Attacks With Expert-Driven Security Program
Third-party security auditors will be brought in to help Microsoft Azure customers secure their Internet of Things deployments
Massive Cyber-Attack Shows Risk Of Poor Security On Network Nodes
ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas of the internet are still unclear, insecure endpoints are the likely culprit
What Makes Ransomware the Worst Type of Malware
In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in mind for the U.S
Oracle Fixes 253 Security Flaws In October Update
Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.
Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild
The bug affects most versions of Linux potentially exposing huge numbers of machines to hackers
Selfie Stealing Android Trojan Discovered By McAfee Labs
Tweaked Acecard trojan aims to trick gullible Android users into sending selfies and photos of their IDs
Foxconn Firmware Flaw Leaves Android Devices Vulnerable To USB Hack
Dubbed Pork Explosion the flaw allows Android security protocols to be bypassed
Symantec Spots Student Scam Powered By Ascesso Trojan
Scammers are trying to trick students into paying for application to the US student loan forgiveness programme
What New Update Process For Windows 7 And 8.1 Means for Enterprises
ANALYSIS: Beginning this week, all updates will be roll-ups, with complete cumulative updates to begin in 2017, eliminating the ability to choose individual patches.
Facebook Twitter & Instagram Ban Data Monitoring App Geofeedia
New privacy row as social networking sites halt access by data gathering app used by law enforcement
US Military Looks To Blockchain To Secure Weapon Data And Nukes
Is Blockchain a possible solution for securing weapons data for the US military, including its nuclear capabilities?
Persistent Warnings Are Causing ‘Security Fatigue’
People are becoming weary of constant security advice and businesses could pay the price for poor decisions, a report has claimed
IoT And The Enterprise World Must Put Cyber Security At The Forefront Warn Experts
IP Expo 2016: Sophos, Kaspersky and Trend Micro talk future threats from IoT, Hired cyber criminals, and security education
Federal Agencies Working With States to Guard Voter Data Security
Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in securing election systems
Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks
ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security researcher and French network service provider
Yahoo Hack: Eastern European Blackhats Responsible For The Massive Data Breach
Cyber security firm InfoArmor says criminal hackers for hire are to blame for the Yahoo hack in 2014
Apple Harvests iMessage Logs And Could Share Them With The Police
Questions are raised over how private Apple's services really are.
Google Releases CSP Web Developer Tools To Combat XSS Cyber Attacks
Google wants to combat persistent XSS web app threats
MarsJoke Ransomware Targets US Government And Education Institutions
Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims
DDoS Attacks Heading Toward 1-Terabit Record
ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not looked at that way
Yahoo, LinkedIn, Apple iCloud: 10 Big Data Breaches
Data breaches from hack attacks continue to get bigger and bolder but which of these do you remember?
What Should You Do After Massive Yahoo Hack?
ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next
Sky And BT Email Users Are Caught Up In Yahoo Password Hack
Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach
Latest iOS 10 Security Features Help Apple’s Business Case
ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according to mobile-device management experts
Apple macOS Sierra Fixes 68 Vulnerabilities
macOS Sierra isn't just a pretty face. Apple has patched quite a few security flaws, including one that affects Docker