Routine fixes for Office and web browsers, but no flaws are being actively exploited in the wild
News Security
CryptoDrop Promises To Stop Ransomware In Its Tracks
University of Florida researchers say the answer to stopping ransomware is to let it onto your system first
Researcher Develops Tool To See If Password Has Been Reused
The tool is intended for defensive purposes, but could also be used to facilitate password attacks
Smartphones At Risk From ‘Dalek’ Voice Attacks
Hidden audio commands can be used to take control of popular voice-activated devices, researchers say
Amazon Denies Server Hack As Kindle User Data Goes Up For Sale
A trove of data on 80,000 users did not come from Amazon's systems, the company said, and may have been automatically generated
Android Malware Grabs 10 Million Devices
The malware, thought to originate in China, generates £232,000 per month in counterfeit ad revenues
Researchers Find Infected Pokémon GO App
A malicious version of the popular game is seeking to take over Android handsets
Facebook Messenger Tests End-to-End Encryption
Playing catch up? Facebook tests encrypted "secret conversations" after last month's security scare concerning chats
400,000 D-Link Devices Vulnerable To Zero-Day Flaw
Security researchers warn of a serious stack overflow vulnerability in a number of devices from D-Link
Euro 2016 Doubles Cybersecurity Risks For Football Fans
New report highlights security dangers for businesses during major sporting events like Euro 2016
Avast Buys AVG For £1bn In Bid To Become Czech IoT Security Giant
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
Apple Mac Malware Gives Backdoor Access And Webcam Control
Malware targets OS X and gives attackers webcam access via Tor and full access of compromised Mac
Darktrace Raises £50m Funding For Cyber Defence Push
Another round of funding for cyber-security firm backed by former Autonomy boss Mike Lynch
Firmware Flaw Affects Lenovo ThinkPads, Other PC Makers’ Hardware
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create their BIOS firmware
Sharp Rise In Identity Theft Among Young UK Adults
Media savvy Millennials still falling for same tricks as fraud rockets 52 percent among those under 30
BT And KPMG: Businesses Are Engaged In An ‘Arms Race’ With Cybercriminals
Companies need to look for ways to go on the offensive against 'industrialised' cyber-criminals, finds a report from BT and KPMG
EU Looks To Protect Europe With £1.5bn Cybersecurity Programme
As part of Digital Single Market, the European Commission initiates public-private investment programme to strengthen Europe's cybersecurity credentials
LizardStresser Webcam Botnet Strikes Brazil And US With IoT Attacks
Large financial institutions and gaming companies are amongst those hit by the latest IoT botnet attacks
Chinese Android Malware Infected 1.4m Devices, Earned £376,000 A Day
The rapidly spreading 'Hummer' Trojan installs unwanted apps, uses up bandwidth and can't be removed
Chinese Gambling Website Victim Of 470 Gbps DDoS Attack
'Largest assault to date' for mitigation provider Imperva Incapsula as gambling company hit by nine-vector DDoS
Belgian Appeal Strikes Down Facebook Privacy Ruling
The appeal annuls a ruling that had prompted Facebook to block access to its Belgian site for non-users
Euro 2016: Official App Exposes Personal Data
The influx of fans to France for Euro 2016 may represent a significant security risk for enterprises
InfoSec 2016: Why Ransomware Should Be Your Number One Concern
VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware
Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access to data
Android Malware Disguises Itself As WhatsApp, Uber And Google Play
Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data
Serious Vulnerabilities In Symantec Products Are ‘As Bad As It Gets’
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
Blindspotter Uses Machine Learning To Find Suspicious Network Activity
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network, but privileged users were the weak point until now.
NASCAR Team Partners Malwarebytes After Ransomware Attack
Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware
US Customs To Request Social Media Data For Passengers
Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States
Office 365 Users Hit By ‘Widespread’ Ransomware Attack
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours