Licensed to spy. GCHQ permitted to hack into computers and phones, even with no national security concerns
News CyberCrime
North Korea Web Outage Was Revenge For Sony Hack
North Korea's December Internet blackout was in retaliation for the Sony hack, admits US cybersecurity official
Panda Antivirus Bricks PCs After Faulty Update
Face-palm time. Panda Antivirus accidentally labels itself malware and damages an undisclosed number of PCs
EU To Model New Security Force On British Counter-Terrorism Unit
Plans for a Europe-wide counter-terrorism unit are being considered to tackle Jihad John and his pals
Hacker Releases More South Korean Nuclear Data
Nuclear operator insists leaked secrets, including blueprints of reactor, are not 'classified material'
Two Arrested After ‘Largest Ever’ Data Breach
Three charged in the United States following major data breach, authorities confirm
Dropbox Repairs Android Security Fault
Cloud storage service repairs flaw that could have allowed hackers to capture data via third party apps
Podec Trojan Can Trick CAPTCHA Into Thinking It Is Human
Russian malware is able to bypass CAPTCHA inputs, Kaspersky report claims
NCA Arrests 57 Suspects In Cybercrime Clampdown
National Crime Agency arrests dozens in cybercrime clampdown on suspected hackers and other online criminals
Pentagon Seeks Hacker Proof Weapon Systems
The top American arms buyer wants future US weapon systems to be hacker-proof
Mandarin Oriental Admits Credit Card Data Breach
Upscale Mandarin Oriental hotel chain, which boasts 27 properties around the globe, is investigating a malware attack on guests' financial data
China Hits Back At Obama Over Software Backdoors
The war of words escalates between America and China over its demand for a backdoor in foreign software
Android Suffers ‘Gazon’ Malware Outbreak
Android users beware of new malware threat from fake app promising Amazon vouchers
Teenager Hacks High School To Improve Grades
American student tests his cyberskills with hack of high school network to bolster exam results
Spam Campaign Exploits Router Security Flaws, Proofpoint Warns
Cybercriminals using phishing techniques to exploit router vulnerabilities, including weak passwords
TalkTalk Admits Customer Account Data Breach
TalkTalk says small but significant number of customers are affected but stresses no payment details have been stolen
Ramnit Botnet Crime Ring Taken Down By Europol
Euro cops shut down botnet that infected 3.2 million computers in order to steal banking information
Lizard Squad Hacks Lenovo Website And Intercepts Emails
Lenovo's main corporate website compromised in apparent revenge for Superfish adware
DDoS Attacks Will Do More Than Tickle The Internet Of Things’ Soft Underbelly
Nexusguard's 2015 Internet Security Trend report reveals DDoS assaults on the Internet of Things will cost businesses millions of pounds
UK Small Businesses ‘Don’t Care About Cybersecurity’
Cyber Streetwise report finds many SMBs don’t know where to start to protect their business
Cyber Security: 4 Key Steps To Resilience
John Green, business and technology development director at IT security firm Accumuli, advises on how to get tough on cyber attacks
LinkedIn Settles Password Theft Lawsuit
LinkedIn pays nearly £1m to settle legal fight after security breach compromised 6.5 million user passwords
FBI Offers Biggest Ever Reward For Admin Of Gameover Zeus Botnet
Russian hacker behind the Gameover Zeus botnet is hit with world's largest ever reward for his arrest
Gemalto Hack Probe Confirms US, UK Spy Link
Gemalto's 'thorough investigation' concludes GCHQ and the NSA was probably behind 'sophisticated intrusion'
2014 Was A Record Year For Cyber Attacks
Hackers increasingly went mobile last year, with Point of Sale terminals also key targets, Trend Micro report reveals
A Third Of Brits ‘Have Lied To Protect Our Online Privacy’
Symantec report finds we trust hospitals and banks with our data, but not retailers or social media sites
How To Explain Phishing To A Five-Year-Old
The definitive definition of phishing (not fishing) from the experts for the kids (and adults, too)
Most Security Breaches ‘From Well-Known Sources’, Says HP
44 percent of breaches in 2014 were caused by known vulnerabilities between two and four years old, report finds
10 Steps To Mitigate A DDoS Attack In Real Time
Gary Newe, systems engineer, F5 Networks, recommends taking 10 decisive actions when you come under DDoS attack
£226m Mt Gox Bitcoin Theft ‘An Inside Job’
Report of Mt Gox bitcoin exchange collapse fuels speculation of inside job after bot discovery