Patch now! BIND flaw is being exploited by hackers and websites can be taken offline, researchers warn
News Security
Employees Just Don’t Care About Keeping Company Data Safe With BYOD
Kaspersky survey finds only one in ten workers bothering to keep work files safe from cyber attack
Two Major Mac OS X Vulnerabilities Bring Apple Security Approach Under Scrutiny
Researchers find exploit for previously known vulnerability and create firmware worm that can spread without physical network
Q&A With Black Hat, DEF CON Founder Jeff Moss
Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always keep your keys in your pocket
Yahoo Ad Network Spreads Malware – Again
The latest malicious ad campaign follows an incident that affected Yahoo and AOL last year
Microsoft Tests Quantum Computer-Proof Web Encryption
New system may allow the web's SSL systems to fend off attacks by advanced quantum computers
How Finance Firms Can Reduce Data Security Risk
IT outsourcing and managed services specialist, Advanced 365, offers its top tips on defending against new cyber threats
Could Your Phone’s Battery Be Spying On You?
Researchers reveal that a flaw in HTML5 API can be used to track users across the web
How To Protect Your Business From A DDoS Attack
Margee Abrams, security services product marketing at Neustar, a real-time information and analytics firm, says criminals will steal from you – and you will suffer a DdoS attack
Leaked NSA Map Details China ‘Cyber-Espionage’ Attacks
A secret map pinpoints successful attacks on companies including Google and Lockheed Martin
NatWest Online Banking Affected By DDoS Attack
Friday's attack marks the fifth time in the past three years that NatWest's online banking service has been hit by problems
Mobile Malware ‘Grows Almost Three-Fold’ In Just Three Months
However the total number of global threats in Q2 2015 fell 19 percent, Kaspersky Labs reports
What Can The United Airlines Hack Tell Us About IT Security?
The data breach at United Airlines could reveal a lot about hacker motivation
Porn Clampdown By Government Questioned
Plan to stop kids accessing smut ignores the fact that most porn websites are hosted outside the UK
Vendors Finding Value in Bug Bounty Programs
Bugcrowd report examines 30 months of bug bounty submissions across 166 programs, finds crowdsourced security is gaining industry-wide adoption
Android For Work Signs Up The World’s ‘Most Secure’ Smartphone
Silent Circle’s security-focused Blackphone 2 will be one of the first to run Google’s new business program
Google Roadshow To Train UK For Online Safety
Google undertakes country-wide roadshow to train Brits about online safety and security
ARM Splashes Cash On Israeli IoT Security Firm
Acquisition of Sansa Security will offer hardware and software-based security features for ARM's IoT chips
Android Security Bug Can Put Your Phone In A Coma
Vulnerability could affect up to half of the Android devices out today, Trend Micro claims
Dutch Bank Launches Voice-Activated Password System
ING Netherlands customers can now log in to their accounts simply by speaking
Three Awesome Windows 10 Security Features
Will Windows 10 be more secure than previous versions? These security features should help
Cyber Attacks Are Daily Reality, Admit Executives
Dire threat landscape...corporate executives admit cyberattacks occur daily or weekly
Senseless Jane Austen Virus May Offend Your Sensibilities
Computer hackers are hiding malicious code in passages of text from some of the world's greatest novels
Google To Let Cloud Customers Use Own Keys To Encrypt Data
Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says
Researchers Demo Tor Network Vulnerability
We are protecting Internet users anonymity researchers say, after successfully attacking Tor network
Consumers Distrust Businesses With Personal Data
Where has the trust gone? Businesses no longer trusted when it comes to handling people's personal data
Would You Sell Company Data To Pay For A Holiday? Many Would…
What price some summer sun? Enough to pay for a trip to Jamaica, apparently
IT Life: Staying Secure
Canon Europe's Quentyn Taylor tells us about printers, Amara's Law, and why business agility is crucial to success
Hacker Forum Darkode Reappears Following Raids
Hackers have begun reconstructing Darkode less than two weeks after coordinated worldwide raids took it down
‘Stagefright’ Bug Could Affect One Billion Android Devices
"Worse than Heartbleed" flaw could allow Android phones to be taken over while they sleep, say researchers, who warn some devices may never be patched