Israeli-based researchers construct data-stealing unit small enough to hide under a pita
News CyberCrime
Just How Dark Is The ‘Deep Web’?
Trend Micro report uncovers disturbing details about the underbelly of the Internet
St Louis Cardinals Hacks Rival Baseball Team
It's just not cricket! FBI probes American baseball team for hacking internal network of rival team
More Than Half Of Passwords ‘Can Be Cracked In 24 Hours’
Trustwave Global Security Report shows shocking state of password security around the world
Apple iOS, OS X Contain Zero-Day Flaws
Tardy response? Apple's security reputation takes another hit as researchers reveal long-standing zero-day flaws
Stegoloader Malware Uses Malicious Code From Images To Steal Data
Dell SecureWorks describes hard to detect Stegoloader as 'wolf in sheeps clothing'
Malvertising Campaign Exposes 50 Million To Malware
Malvertising campaign exposes up to 50 million internet users to the Angler EK and Bunitu malware
Businesses ‘Becoming Complacent’ Over Danger Of DDoS Attacks
F5 study reveals security concerns over DDoS are falling, despite the number of attacks being on the rise
German Parliament Hack Is Still Gathering Data
A cyber-attack on German parliament computers a month ago is reportedly still active and stealing data
Fake Mobile Towers Spy On UK Phone Users
British mobile users revealed to be under survelliance from police and other forces using fake mobile phone towers
Cybersecurity Costs ‘To Soar 38 Percent’ Over The Next Decade
Upgrade now or face being overrun by criminals with more advanced tools, RAND report warns businesses
Hacking Is ‘One Of The Most Profitable Industries In The World’
Ransomware bullies can earn up to 1,425 percent return on their investment, Trustwave report reveals
Beware – Duqu Has Returned, Kaspersky Reveals
‘Highly sophisticated’ Duqu 2.0 threat infects nuclear discussions and even attacked Kaspersky’s own systems, firm admits
Ransomware, Phishing And Spam Attacks Hit New Highs In Q1 2015
Six trillion spam messages sent worldwide in the first three months of 2015, McAfee Labs report finds
What Can We Learn From The Largest US Government Data Theft?
China has been blamed for a hack in which huge amounts of US Government officials' data was stolen. China has denied it, but the whole world can learn from it
Cybercriminals Could Use iOS Vulnerability To Hack Apple Pay
Apple Pay could be hijacked by criminals using fake login page, Wandera warns
China Denies Hack Of US Government Personnel Records
China denies it was behind massive breach of US government data and employee records
Pole Position: How Kaspersky Helps Ferrari Stay Secure From Factory To Racetrack
Security firm helps build ‘the most secure house in the world’ to keep Ferrari safe
Troldesh Ransomware Hacker Agrees To Halve Fee After Negotiations
Can you bargain with a Russian hacker over the ransom fee to unlock your computer? Yes says one researcher
Knowledge Is Power To The Hacker
SecurEnvoy's Steve Watts tells us how hackers are gaining more and more power through unsecured knowledge access points
North Korean Hackers Can Kill, Claims Defector
North Korea spends up to 20 percent of its military budget honing its cyber-attack capabilities
Queen’s Speech Confirms Return Of Snoopers’ Charter
Government confirms sweeping new powers for the security services in fresh blow to privacy campaigners
Criminals Target Windows Live ID Accounts
New scam uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, Hotmail, Outlook, MSN, Messenger and OneDrive.
Sophos – IT Skills Gap Is ‘Leaving The Door Open’ For Criminals
Sophos’ John Shaw tells TechWeekEurope why government agencies need to sharpen up their defences
LogJam Vulnerability Exposes Encryption Fears
Not again! Another legacy encryption flaw could explain how the NSA and co cracked encrypted communications
IBM Boosts Cyber Defence With Threat-Sharing Initiative
It's good to talk - IBM initiative aims to help companies share their cyber security experiences
NetUSB Flaw Exposes Millions Of Routers
Newly uncovered legacy vulnerability could put millions of routers at risk
Telstra, Pacnet Hack Like ‘Crashing New Car’
Telstra executives were only told about Pacnet security breach after their purchase of the firm was complete
Financial Firms ‘Take Up To Three Months’ To Detect Cybersecurity Threats
Retailers fare even worse, taking up to six months to identify threats, Arbor Networks survey finds
Look Out – Cybercriminals Are Getting Smarter, Says Trend Micro
Hackers launching a increasing mix of old and new style attacks, Trend Micro survey finds