Malware targeting Android "Gingerbread" uses jailbreak exploit for root access to run remote instructions
News Security
Cameron Would Be Crazy To Block Social Networks
The prime minister's suggestion that social networks should be blocked during riots was just puff, says Sophie Curtis
Chinese Government Hack Caught On TV
The Chinese government has always denied it hacks western targets but a new video shows otherwise
Police Launch Crime Fighting iPhone App
Surrey Police have launched an app helping the public to report crimes and monitor police activity
Government Consults Social Media Chiefs On Riots
Representatives from Facebook, Twitter and RIM will meet Theresa May on Thursday to discuss the recent riots
Microsoft Drops Respawning Cookies From MSN
Microsoft removed cookies that were able to regenerate even after the user deleted them
Former Wikileaks Staffer Admits Deleting Files
A former employee of the whistleblowing site has admitted to deleting thousands of unpublished files
Mobile Phones – The Weakest Link In The Chain
Letting workers bring their own devices to the office allows malware to outpace the security measures available, says Eric Doyle
Hackers Use Social Tricks To Get Bank Passwords
Auditors at Trace Security used social engineering tactics to obtain sensitive information and infect systems
Security Most Pressing Issue For Readers
Security concerns you more than broadband coverage and patents. Next up: Did you take work on holiday?
Angry US IT Worker Wreaked Havoc At Drugs Firm
A disgruntled US IT administrator deleted multiple virtual hosts at Japanese pharmaceutical firm Shionogi
Defence Contractor Breached By Anonymous AntiSec
Anonymous continued its AntiSec rampage, targeting US defence contractor Vanguard's documents
Facebook Hacked By British Student
A student has appeared in court to face charges that he allegedly hacked into the servers of Facebook
Apple Faces 27,000-Strong South Korean Lawsuit
A class action lawsuit has been filed against Apple in South Korea, for violations of privacy
Poor SSL Setups Leave Websites Open To Attack
Organisations are transmitting sensitive data without any security due to improper SSL configuration
Rapid Spread Of Cracked SpyEye Trojan Code Expected
Experts predict an explosion in SpyEye variants now the pricey kit is openly available cheap – or even free
Spam Hits Pre-Rustock Takedown Levels
A spam outbreak is hitting levels not seen since Rustock was disabled in March, according to Commtouch
Web Users Complacent Over Identity Theft Risks
An alarming number of web users are risking identify theft because of their poor online behaviour
Hackers Use Botnets To Search For Victims
Hackers are using botnets and specially crafted search queries called “Dorks” to identify vulnerable websites
ICO Wants More from Google On Privacy
The ICO says Google is moving in the right direction on privacy but still has more to do
Government Prodded Over Personal Data Protection
The Equality and Human Rights Commission says government needs to overhaul its data protection regime
Android Trojan Answers Incoming Calls
A new variant of the Nickispy Trojan can intercept calls while sending messages out to a remote server
McAfee Adds iOS Support To Mobile Management Suite
McAfee has added more management features to WaveSecure, but has held off on malware protection
RIM Patches Critical BlackBerry Enterprise Server Bug
RIM has fixed several critical bugs to do with the processing of images on BlackBerry Enterprise Server
HTML5 Allows Cookies To Rise From The Dead
A recent report shows that privacy is an illusion as persistent Flash and HTML5 cookies respawn after deletion, says Eric Doyle
BlackBerry Management Centre Launched For SMBs
RIM's new free online management service simplifies smartphone security and requires no technical expertise
Anonymous Targets San Francisco Rail Passengers
In support of anti-police protests in San Francisco, Anonymous has leaked the personal data of BART customers
Hackers Shift From Child’s Play To Serious Business
Cyber-attackers are hitting higher-profile targets for financial gain, for "hacktivist" causes or just for fun
A Dozen Vulnerable Android Apps Uncovered
Commonly used Android apps leave phones vulnerable to phishing and hijacking, according to Privateer
Google+ Fake Namers To Get Four-Day Grace
Google is to enforce its real name policy on Google+, giving those using fakes name four days to change