CyberCrime

Twitter Pulls The Plug On More Terrorist Accounts

Twitter suspends 360,000 accounts for 'promotion of terrorism', but warns there is no magic algorithm to ID suspects

8 years ago

Sage Employee Arrested At Heathrow Airport

Just days after damaging data breach at Sage, police confirm arrest of staffer at Heathrow airport

8 years ago

Linux Networking Flaw Allows Attacker To Trick Safety Mechanism

A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?

8 years ago

Tor Network Makes ‘Do No Harm’ Pact With Users In Social Contract

Keeping it open source baby. Tor Social Contract promises no backdoors and complete honesty with its users

8 years ago

Linux Trojan Written In Go Mines For Cryptocurrencies

'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software

8 years ago

Instagram Hack Promotes Porn Spam And Adult Dating

Symantec warns of Instagram profile hack that uses compromised accounts to promote adult dating websites

8 years ago

FTC Commissioner Looking For Hackers’ Help With Consumer Privacy

FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…

8 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

8 years ago

Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil

Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games

8 years ago

State Of Ransomware: More Than Half Of UK Firms Are Victims

Crippling threat...20 percent of firms hit by ransomware had to cease business operations

8 years ago

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

8 years ago

Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In

BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…

8 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

8 years ago

ATM Hack Gives Attackers Cash And Account Data

BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures

8 years ago

Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m

Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack

8 years ago

Researchers Discover Major HTTP/2 Flaws

Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution

8 years ago

Kaspersky Lab Creates Bug Bounty Program

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

AdGholas Malvertising Campaign Closes After Proofpoint Discovery

AdGholas malvertising campaign closes after pulling in at least a million victim computers a day

8 years ago

Cyber Attack Uses Google Drive To Deliver 9002 Trojan

Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries

8 years ago

KeySniffer Flaw Exposes Wireless Keyboard Typing

Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away

8 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

8 years ago

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

8 years ago

ONS Figures Show UK Cybercrime Doubled In Past Year

Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime

8 years ago

‘Apple’s Stagefright’: iOS And Mac Users Urged To Update Immediately

iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…

8 years ago

HTTpoxy Flaw Re-emerges After 15 Years And Gets Fixed

After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…

8 years ago

Code Hooking Opens Security Product Vulnerability

Fresh concern raised about the security of the very products designed to protect users from cyber nastiness

8 years ago

Researchers Warn Of Rio 2016 Malware As Olympic Searches Return Threats

Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised

8 years ago