The airline had grounded all flights around the world following a computer system outage
News Security
Google Research Finds Nuisance Software Deluge
Users are being targeted by more than 60 million download attempts per week
900 Million Android Devices ‘Vulnerable To Attack’
The QuadRooter bugs could allow seemingly harmless apps to take over many Android gadgets
Apple Emergency Update Fixes Major Flaw With iOS 9.3.4
The latest vulnerability could allow attackers to take over the root functions of an iOS device
Windows 10 Linux Feature Brings Real, But Manageable Security Risks
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because of potential security risks
Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
State Of Ransomware: More Than Half Of UK Firms Are Victims
Crippling threat...20 percent of firms hit by ransomware had to cease business operations
Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and infect devices
Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In
BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer, despite risk
Apple Launches £150,000 Bug Bounty Program
BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware
Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run Linux
ATM Hack Gives Attackers Cash And Account Data
BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures
IBM Launches X-Force Red Pen Testing Task Force
IBM security group will test the mettle of security policies by carrying out testing on networks, hardware and humans
Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m
Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack
Researchers Discover Major HTTP/2 Flaws
Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution
Kaspersky Lab Creates Bug Bounty Program
Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products
Ruckus Routers Found With Multiple Security Flaws
Tripwire research finds Ruckus routers are susceptible to intruders
Why Airbnb Users And Hosts Must Beware Of WiFi Risks
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be at risk
Google Releases Customer-Supplied Encryption Keys For Cloud
Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine
Web Users Are Still Being Tracked By Their Smartphone’s Battery Status
Battery Status API in HTML5 is being used to track user activity, warn security researchers
Black Hat USA and DefCon: Finding Security Risks in All the Things
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
Yahoo ‘Aware’ Of Data Breach Claim
Yahoo said it is investigating reports that 200 million users' data is being sold online
GhostMail Ends Services ‘To Prevent Misuse’
GhostMail said it doesn't want its encrypted email service used by 'the wrong people'
IT Worker Jailed For Disabling Citibank Network
The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America
BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why firms should trust telcos
WhatsApp ‘Doesn’t Fully Delete Messages’
Deleted WhatsApp messages could be easy to recover, with unencrypted copies stored on iCloud, a researcher finds
SwiftKey Stops Cloud Sync Following User Data Leak
SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service
AdGholas Malvertising Campaign Closes After Proofpoint Discovery
AdGholas malvertising campaign closes after pulling in at least a million victim computers a day
Robocall Plague Won’t Be Easy To Solve Despite FCC Call For Action
ANALYSIS: Recent FCC pressure is resulting in some movement by carriers to try to quell robocalls, but much needs to be done before anyone sees any real relief
Stagefright Poses Serious Risks One Year After It First Surfaced
ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws have emerged and hundreds of millions of users remain at risk