CyberCrime

MPs’ Cybersecurity Admissions Highlight Need For Culture Change At Westminster

ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better

7 years ago

Morrisons ‘Ultimately Responsible’ For Rogue Employee Leaking Payroll Data

Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online

7 years ago

NATO Plots Cyber Warfare Rules

NATO members to draw up rules and on how and when to deploy its cyber warfare capabilities

7 years ago

Classified US Army Data Found Unprotected On AWS Server

Top secret army data found online after virtual image of hard disk was left on an AWS server

7 years ago

SWIFT Warns Banks Of Increasing Digital Robberies

Hackers are using increasingly sophisticated tools and techniques for attacks against banks, SWIFT warns

7 years ago

Apple Fixes Serious MacOS Password Bug

UPDATED: MacOS High Sierra has a serious flaw with admin privileges, as researcher criticised for public disclosure

7 years ago

McAfee To Buy Skyhigh Networks In Cloud Cybersecurity Push

McAfee's first major acquisition as an independent security firm is Skyhigh Networks

7 years ago

‘Concerned’ UK Regulators Look Into Uber’s Hidden Data Breach

ICO and NCSC are looking into the scale of the Uber hack before they take next steps

7 years ago

Security Panel: What On Earth Was Uber Thinking?

Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?

7 years ago

US Government Warns Businesses Over Intel Management Engine Flaw

Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors

7 years ago

Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen

New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…

7 years ago

Five Steps To Keep North Korean Hackers Out Of Your Network

ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…

7 years ago

CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates

CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software

7 years ago

IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security

At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…

7 years ago

IBM Quad9 DNS Service Offers Rogue Site Protection

Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection

7 years ago

North Korea Getting Ready Wage A Global Cyber War, Experts Say

ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…

7 years ago

Cash Converters Admits Data Breach After Website Hack

Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters

7 years ago

Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack

Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…

7 years ago

MIT Helping To Define New Model To Restore Trust In Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…

7 years ago

ESET Detects More Malicious Apps On Google Play

Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan

7 years ago

IBM X-Force Discovers IcedID Banking Trojan

New banking Trojan discovered and is active in the wild hitting targets in the United States and the UK

7 years ago

Apple iPhone X Face ID ‘Is Tricked’ By 3D Printed Mask

Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure

7 years ago

Huddle Flaw Exposes Sensitive Corporate Data

Confidential KPMG documents accessed because of security flaw with sign in process

7 years ago

University Of East Anglia Suffers Second Data Breach

Not again...sensitive health data on university staff member emailed to hundreds of students

7 years ago

IT LIFE: Toni Gidwani, Threat Connect

ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks…

7 years ago

Businesses Still In The Dark On IoT Cybersecurity

Many enterprises are complacent about IoT security according to new Forrester research, and most lack device visibility

7 years ago

Sowbug Hacking Group Targets South America & Asian Governments

Previously unknown hacking group found targeting foreign policy and diplomatic targets

7 years ago

Silence Trojan Actively Targets Banks & Financial Institutions

Financial institutions facing targetted threat from Silence trojan which infiltrates internal banking networks

7 years ago