Security Management

Police Ambush Criminal To Bypass iPhone Security

How to get around the problem of a locked smartphone? Just ambush the criminal when he is using it. Simples

8 years ago

AWS Shield To Safeguard Web Apps From DDoS Nastiness

Amazon introduces AWS Shield managed service to protect against crippling DDoS attacks

8 years ago

Talk Talk And Post Office Broadband Taken Offline After Mirai Botnet Hack Attack

Mirai botnet strikes again, attacking routers and cutting-off broadband

8 years ago

Europol Terror Data Found On Unsecured Network Drive

Red faces at Euro cops after sensitive terror data is found online by Dutch TV programme

8 years ago

Million Google Accounts Hacked by ‘Gooligan’ Android Malware

Android malware has compromised more than one million Google accounts, warns Check Point

8 years ago

ICO Launches Probe After National Lottery Compromise

ICO begins investigation after Camelot detected 'suspicious activity' on player online accounts earlier this week

8 years ago

Up To 26,500 National Lottery Online Accounts Are Breached

National Lottery and experts suggest accounts breached by reusing compromised credentials

8 years ago

Black Friday, Cyber Monday Bring Open Season for Cyber-Criminals

ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…

8 years ago

One In Four Wi-Fi Hotspots Ripe For Hack Attacks

Cyber security firm Kaspersky finds that large amounts of Wi-Fi hotspots still lack solid security

8 years ago

Election Recount Unlikely To Reveal Evidence Of Vote System Hacking

ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…

8 years ago

Ask Search Bar Adware Exploited By Malicious Actor To Deliver Malware

Malicious actors have been found to be using the Ask search bar software to distribute malware of its users machines

8 years ago

European Commission Victim Of “Large Scale” Cyberattack

The EC has passed details of the attack to the EU’s cyber emergency response team

8 years ago

US Navy Confirms Sailor Data Leak From Compromised Laptop

Call Agent Gibbs. Personal information on more than 130,000 US sailors compromised after HPE laptop breach

8 years ago

Bletchley Park To Host ‘Codebreakers’ Cybersecurity School

Winston Churchill's top secret World War two installation to teach cybersecurity skills to next generation

8 years ago

Twitter Touts Anti-Snooping Developer Agenda

Twitter will block developers who abuse the use of its APIs and Gnip data for snooping purposes

8 years ago

Apple iPhone Users Beware Of ‘Prank’ Video

Another iOS flaw...seemingly innocent video crashes all Apple iPhones, forcing hard reboot

8 years ago

Deliveroo Customer Accounts Are ‘Compromised’

Customer accounts hacked but Deliveroo denies breach of its systems and urges customers to improve their passwords

8 years ago

How To Protect The Encryption Keys To Your Kingdom

ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…

8 years ago

Android Fake Email App Trojan Takes Aim At German Banks

Android malware appears to be increasingly tailored to target specific banking services

8 years ago

Qualcomm Bug Bounty Offers Up To £12,000 For Snapdragon Flaws

Qualcomm is offering up to $15,000, approximately £12,000, to people who spot bugs in its modems and processors.

8 years ago

Siri Bug Bypasses Apple iPhone And iPad Password Protection

A flaw in Apple's virtual assistant enables dexterous hackers to gain access to an iOS device's contacts and photos

8 years ago

Symantec Acquires LifeLock For £1.9bn To Boost Norton Division

The security giant looks to turn its ailing consumer security software division

8 years ago

Cheap ‘Poison Tap’ Tool Hacks Locked Computers

Unattended password-protected or locked PCs or Macs can be hacked with a simple $5 device

8 years ago

Three Suffers Data Breach As Hackers Steal Customer Data

A trio of men have been arrested in relation to unauthorised access to Three's customer database

8 years ago

Snooper’s Charter 2.0 Is Set To Become Law As Lords Pass Controversial IP Bill

ISPs set to be required to keep your internet search history on record for at least a year in order…

8 years ago

Apple ‘Sends iPhone Call History To iCloud’

Law enforcement could get their hands on call data if it is sent to iCloud for 'no reason', claims Russian…

8 years ago

Symantec: Hackers Are Becoming Expert IP Hunting Professionals

Fujitsu Forum 2016: Cyber crime can now be considered a professional, targeted business, according to Symantec

8 years ago

DocuSign Opens Cybersecurity Centre In Dublin

DocuSign continues European expansion with cybersecurity investment in the Irish capital

8 years ago

Philips Hue Smart Lightbulbs Hack Can Spread IoT Worm Like Wildfire

Smart lighting may be the next Internet of Things (IoT) attack vector, thanks to hackable Philips Hue smart lightbulbs.

8 years ago

Yahoo Investigates Cookie Powered Password Bypass Hack

The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny

8 years ago