Firewall

Macro Malware, Aging Worms Continue To Pose Threat To Present Day

Macro malware, which is so 1990s, has made a comeback, joining other aging cyber-threats, such as PHP scripts and the…

8 years ago

Government Pushes Cyber Essentials Security Certificate Programme

The government will now require all contractors to obtain a Cyber Essentials certificate

8 years ago

Pwn2Own Hackers Earn $340,000 Exploiting Windows, macOS

The second day of the Pwn2Own 2017 hacking competition reveals Windows, macOS, Adobe Flash and web browser exploits

8 years ago

Ubuntu Linux Falls On Day 1 Of Pwn2Own Hacking Competition

First day of Trend Micro-sponsored Pwn2Own competition awards $233,000 to security researchers for exploiting software

8 years ago

Security Breach Sees Thousands Of Welsh NHS Staff Data Stolen

The data was swiped form a server being operated by an external contractor

8 years ago

Leak Of CIA Hacking Secrets Serves As Alert To Close Security Gaps

ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a…

8 years ago

WordPress 4.7.3 Updates For Six Security Issues

The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws

8 years ago

Google Volunteer Team Patches Thousands Of Open Source Projects

A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016

8 years ago

1.4bn Emails Exposed As Huge Spam Operation Fails To Password Protect Documents

Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day

8 years ago

MWC 2017: Eugene Kaspersky ‘Comes Back From The Future’ To Warn About IoT Security Threats

Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017

8 years ago

IT Life: Paul Calatayud, Firemon CTO

Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest…

8 years ago

Carbon Black: It’s Time For Next-Gen Endpoint Security

Carbon Black believes now is the time to move on from traditional antivirus (AV) software and embrace the next generation…

8 years ago

Quiz Of The Week: Cyber Security In 2017

Hackers, ransomware, and malicious code do not seem to be going anywhere in 2017

8 years ago

Huawei Targets Enterprise Clouds With Integrated Security Gateway

Enterprise cloud security. Lock up your virtual network with 'industry first' terabit-level security gateway

8 years ago

Avast CTO: AVG Purchase Lets Us Build Tools For Data-Driven Cybersecurity Era

INTERVIEW: Avast bought AVG for £1bn last year so it can gain access to 1 in 3 PCs around the…

8 years ago

February Patch Tuesday Is Delayed To Fix ‘Last Minute Issue’

The brand new Patch Tuesday will have to wait a bit longer for its debut because of a botched update

8 years ago

Ransomware Used to Seize Control Of Simulated Water Plant

Georgia Tech researchers have created ransomware that can attack critical infrastructure

8 years ago

Executives And IT Managers Disagree On Who Is Responsible For Cybersecurity

BAE survey says that unless there is more coordination between executives and IT departments, hackers will find holes to exploit

8 years ago

Security Firm Trend Micro’s Blog Falls Victim To Content Spoofing Attack

Trend Micro confirms a content spoofing vulnerability allowed fake articles onto its blog and says firms should respond honestly and…

8 years ago

Kaspersky Discovers New Malware Designed To Stealthily Steal Data

ANALYSIS: Kaspersky Lab has discovered a new strain of malware that hides in memory and trusted applications while it stealthily…

8 years ago

Hacker Takes Down 20 Percent Of Dark Web Hosted Sites

Freedom Hosting II had 10,000 Tor-based webpages rendered inaccessible

8 years ago

LogicHub Security Intelligence Automation Platform Debuts

Startup emerges from stealth with new funding and the promise of improving threat detection by automating activities that typically require…

8 years ago

Google Coughts Up $1m For Each Chrome And Android Bug In 2016

The search company paid out over 1,000 individual rewards in 2016

8 years ago

Europe Is The Most ‘Malware Riddled Continent’

Cisco also finds that malware attacks come with costly consequences for targeted businesses

8 years ago

Malware-Loaded Microsoft Document Aimed At NATO Governments

Cisco’s Talos researchers discovered the threat which sported unusual cyber features

8 years ago

How To Avoid Fake Apps And Keep Your Online Data Private

We're all internet users, so we all must know how to spot fake apps and how to keep our own…

8 years ago

Apple Issues Security Updates For iPhone, Mac & Apple Watch

Two dangerous kernel bugs highlighted by Google's Project Zero have been squashed

8 years ago

‘Prank’ Emoji iMessage Is Crashing iPhones And iPads

Another iMessage bug has been found, affecting most versions of iOS

8 years ago

Patch Tuesday: Microsoft To Stop Publishing Security Bulletins

Patch Tuesday is changing: From February, Microsoft will communicate security updates via a dynamic online portal rather than a static…

8 years ago