Opera admits breach of its servers and warns accounts and passwords could have been compromised
News CyberCrime
Iran Removes Malware From Petrochemical Plants – Report
Iran takes 'necessary defensive measures' after malware is discovered at two of its petrochemical plants
Apple Patches iPhone Spyware Vulnerabilities With iOS 9.3.5
I spy with my little iPhone! Apple rushes out iPhone patch after discovery of government spying hack
Researchers Warn Of ‘Epidemic’ Money-Flipping Malware On Instagram
Bank followers on Instagram beware of money-flipping 'epidemic', but photo-sharing platform says scams are "low volume"
Universities Plagued By Ransomware Attacks
Yet only one university contacted the police about their attack, as criminals demand as much as £2,200
Security Researchers Discover First Twitter-Controlled Botnet
Twitoor, uncovered by ESET, can plague Android devices with malicious malware
UK Continues To Be Battered By DDoS Attacks
DDoS attacks increase by over 200 percent, with the UK the second most targeted nation
Twitter Pulls The Plug On More Terrorist Accounts
Twitter suspends 360,000 accounts for 'promotion of terrorism', but warns there is no magic algorithm to ID suspects
Sage Employee Arrested At Heathrow Airport
Just days after damaging data breach at Sage, police confirm arrest of staffer at Heathrow airport
Linux Networking Flaw Allows Attacker To Trick Safety Mechanism
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
Tor Network Makes ‘Do No Harm’ Pact With Users In Social Contract
Keeping it open source baby. Tor Social Contract promises no backdoors and complete honesty with its users
Linux Trojan Written In Go Mines For Cryptocurrencies
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
Instagram Hack Promotes Porn Spam And Adult Dating
Symantec warns of Instagram profile hack that uses compromised accounts to promote adult dating websites
FTC Commissioner Looking For Hackers’ Help With Consumer Privacy
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes a plea to hackers
Windows 10 Linux Feature Brings Real, But Manageable Security Risks
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because of potential security risks
Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
State Of Ransomware: More Than Half Of UK Firms Are Victims
Crippling threat...20 percent of firms hit by ransomware had to cease business operations
Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and infect devices
Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In
BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer, despite risk
Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run Linux
ATM Hack Gives Attackers Cash And Account Data
BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures
Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m
Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack
Researchers Discover Major HTTP/2 Flaws
Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution
Kaspersky Lab Creates Bug Bounty Program
Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products
Why Airbnb Users And Hosts Must Beware Of WiFi Risks
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be at risk
Black Hat USA and DefCon: Finding Security Risks in All the Things
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why firms should trust telcos
AdGholas Malvertising Campaign Closes After Proofpoint Discovery
AdGholas malvertising campaign closes after pulling in at least a million victim computers a day
Cyber Attack Uses Google Drive To Deliver 9002 Trojan
Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries
KeySniffer Flaw Exposes Wireless Keyboard Typing
Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away