Confidential data from the US military contractor that supports the Minuteman III nuclear deterrent has been stolen by hackers
News Security
Agents of Transformation
AppDynamics have launched a COVID-19 edition of its global research ‘The Agents of Transformation.’ The report includes data from interviews with IT professionals - from board-level directors and CIOs, through to senior and mid-level I ...
TrickBot Malware Update Makes It Harder To Detect
TrickBot information-stealing malware updated with new 'nworm' module that uses encryption and in-memory execution to hinder detection efforts
Is Video Conferencing Secure Enough?
The COVID-19 crisis has seen an explosion in video and teleconferencing service use. Looking into the future, if more mass remote working is to become the norm, how will existing systems cope? Are they secure enough? Do we just need mo ...
Apple iPhone Exploit Allows Users To ‘Jailbreak’ Devices
Fully updated Apple devices contain the exploit that allows the first public jailbreak for Apple's iOS operating system for nearly four years
How To Manage Virtual Teams
As businesses adapt to the 'new normal', a significant component of their organization will be virtual teams. Silicon UK discovers the critical skills that virtual leaders need to be successful and, asks what being a virtual leader mea ...
‘Ragnar Locker’ Ransomware Hides Inside Virtual Machine
Researchers discover attack group that deploys highly targeted ransomware running inside virtualised Windows XP instance to evade detection
Cryptocurrency-Mining Campaign Hits ‘Thousands’ Of Enterprises
Security researchers find attackers breaking into public-facing Windows IIS web servers to install Monero-mining malware across networks
GitLab Hacks Own Remote-Working Staff In Phishing Test
Company finds 20 percent of its all-remote staff responds to phishing message by exposing user credentials, raising fears about the work-from-home future
Popular Maths Site Investigates ‘Potential Data Compromise’
Students and children at risk as more than 25 million account credentials allegedly stolen from Mathway offered for sale online
Microsoft Uncovers ‘Massive’ Pandemic-Themed Phishing Campaign
Scam emails use Excel spreadsheets containing Covid-19 data as a lure, then execute malicious macros that give attackers control over system
Securing The DARQ Future
Distributed Ledger Technologies (DLT), Artificial Intelligence (AI), Extended Reality (XR) and Quantum Computing expand (DARQ), will be the next wave of technologies to transform every business. How should your company ensure that DARQ ...
Google Chrome Follows Firefox Lead With DoH Option
Three months after Firefox turned on privacy feature called DNS-over-HTTPS (DoH), Google's Chrome browser gets same feature, but only if ISPs support it
Is Home Your Business’s New Network Security Perimeter?
Post COVID-19 could see many businesses permanently using home-based working as the norm for their enterprises. With annual reports stating lax security protocols and behaviours are still the norms (nearly 40% of workers never change t ...
Google Cloud Wins Pentagon Cyber Threat Contract
No, not the JEDI contract. Google Cloud wins contract to help the US defense department detect and respond to cyber threats
Coronavirus: NHS Contact Tracing App Has Flaws, Aussie Researchers Warn
Security flaws in the NHS coronavirus contact-tracing app could pose risk to user privacy, as the NCSC promises to fix the issues
EasyJet Hack: Security Expert Reactions
Beware the phishing scams warn experts, as the hack of easyJet make available more valuable personal information on the dark web
EasyJet Admits Hack From ‘Highly Sophisticated Source’
Personal information of 9 million customers accessed in a “highly sophisticated” cyber-attack, which saw the credit card details of 2,200 people exposed
FBI Criticises Apple For Failing To Help Unlock iPhones
Agency says it had to develop its own tool to access two locked iPhones used by gunman who attacked Pensacola Naval Air Station in December 2019
Bluetooth Standard Vulnerable To Unpatched Spoofing Attack
Researchers warn of weaknesses affecting all Bluetooth-compliant devices – just as governments roll out coronavirus apps reliant on the tech
Supercomputers Across Europe Shut Down After Crypto-Mining Attacks
Hackers break into academic high-performance computing clusters in Edinburgh, Germany and Switzerland to install Monero currency-mining software
Celebrity Law Firm Hackers Double Ransom Demand
Hackers demand $42m from New York law firm that represents Lady Gaga, U2, Jessica Simpson and others – and promises to leak information on Donald Trump
Android Hit By ‘Incredibly Sophisticated’ Malware
Malware found on Google Play looks innocent at first, then downloads additional capabilities that allow it to take over targeted devices
Angela Merkel Slams ‘Outrageous’ Russian Hacking
German Chancellor Angela Merkel confirmed she was targeted by hackers, linked to Russia's military intelligence (GRU) agency
FBI Accuses China-linked Hackers Of Attacking Coronavirus Researchers
The FBI and Department of Homeland Security say China-linked hackers are attacking US firms carrying out Covid-19 research
Thunderbolt Ports Vulnerable To Hackers
If a hacker gains physical access to your computer, the Thunderbolt port could be exploited to access the hard disc drive
Celebrity Law Firm Hacked, Attackers Threaten To Leak Stolen Data
Personal information and contracts belonging to celebrities including Lady Gaga, Madonna, and Elton John have been stolen by hackers
VE Day 2020: Bletchley Park Reveals Last Decoded Nazi Message
Final encrypted message sent by Nazi military unit in the final days of the Second War World in Europe has been revealed by GCHQ
Fresenius Hospital Operator Suffers Ransomware Attack
Despite high demand during the Coronavirus pandemic, hackers have hit IT systems of a major hospital operator with a ransomware attack
World Password Day: Is The Password Still Fit For Purpose?
The password has become a significant source of security breaches and user friction. On World Password Day, have we arrived at the point where the password must be replaced with new security protocols?