More encryption problems uncovered on WhatsApp
News Security
Popular Processors ‘Are Riddled With Backdoors’
IOActive CTO Gunter Ollman says research is uncovering a lot of interesting flaws on much-used chips
Rising Threat: Cyber Bank Heists With Citadel’s Man-in-the-Browser
Man-in-the-Browser attacks are only getting more frequent, thanks to the Citadel botnet and numerous other threats, says Dennis Schwarz
UK Bank ‘Cyber War Games’ Coming In November
Bank of England to oversee stress tests next month
NCCU: UK FBI-Style National Cyber Police Launched
Tthe PCeU and the SOCA cyber team formally come together as National Crime Agency launches
Samsung Called Before Court For Alleged Leak Of Apple Secrets
Samsung allegedly used secret Apple licensing terms in negotiations with Nokia
Security Research Must Have Its Just Rewards
After T-shirt-gate, Mozilla and Microsoft, can show Yahoo the right way - and the wrong way - to respond to security research, says Sean Michael Kerner
Vormetric : Organisations Struggling Against Insider Threat
A new study suggests that most organisations do not block privileged users from access to sensitive data
Internet Explorer Zero-Day To Be Fixed On Patch Tuesday
Microsoft gets its fix ready following attacks on various organisations
GCHQ Refuses To Answer Questions On Belgacom Hack
Intelligence agency unsurprisingly keeping schtum over attack allegations
US Charges 13 Alleged Anonymous Members
Alleged Anonymous DDoSers charged for Operation Payback attacks
Adobe Admits Massive Security Breach
Adobe has reported a major security breach that could impact up to 2.9 million customers
Privacy Bodies Take GCHQ Snooping Fight To EU Court
Complaints lodged with European Court of Human Rights as the Snowden leaks fallout spreads
GitHub Struggles With Second Day Of DDoS Attacks
Code repository battered by DDoS attacks for the second day running
Patent Troll Lodsys Gives Up Kaspersky Fight
Out of 55 companies taken to court by patent troll Lodsys, Kaspersky was the only one to stand up to the troll
Former CTO of NSA: ‘See Everything To Protect The Right Things’
Machine-generated data can enhance cyber security, says Prescott Winter during his keynote at .conf 2013
Post T-Shirt-Gate, Yahoo Offers Up To $15k Bug Bounty
Researchers will get more than corporate swag for finding flaws
Silk Road Closure Causes Sharp Drop In Bitcoin Value
BTC goes from $142 to $118 after the FBI shuts down illegal online marketplace
Professional Cyber Espionage Rings To Grow
Espionage on demand hacking groups are set to increase, warn experts
Man Arrested As Underground Site Silk Road Shut Down By FBI
Man accused of being secretive website founder Dread Pirate Roberts arrested
The 100Gbps DDoS Attack That No One Saw
Not many people noticed, but last week saw a DDoS attack using 100Gbps of raw bandwidth, says Sean Michael Kerner
UK Banks Told To Test Cyber Attack Resilience
Banks also asked to test resilience against legacy IT failures
BlackBerry 10 Receives NATO Security Clearance
BlackBerry 10 and BlackBerry Enterprise Service 10 can now handle 'restricted' information
Windows Azure Gains Federal Security Approval
Microsoft's Windows Azure has been granted the FedRAMP stamp of approval for US governmental use
F-Secure To Launch ‘Anti-Snooping’ Cloud Storage With Younited
Finnish firm promises fresh, privacy-focused approach to cloud storage
Yahoo Slammed Over $12.50 Bug Bounty
In a move described as a "bad joke", company gives researchers $12.50 voucher for its own corporate gear
Caspar Bowden: I Don’t Trust My Ex-Employer Microsoft After NSA Leaks
Former Microsoft privacy advisor says he isn't convinced by the security offered by the company's tech
Tech Club: Can You Keep Secure On A Tight Budget?
If money is tight, which security features are top priority? Let us know and come to our next gathering
Internet Explorer Zero-Day Exploits Hit More Governments, Financial Bodies
Experts were right - IE zero-day attacks are escalating
Security Experts Debate Offensive Strategy
For most enterprises, taking offensive action against cyber-attackers is probably not the best strategy, according to an International Information Systems Security Certification Consortium panel