Security Management

Microsoft Extends Windows 7, 8.1 Support Deadlines

But Redmond insists enterprise customers are moving to Windows 10 faster than any version of Windows

9 years ago

Linux Trojan Written In Go Mines For Cryptocurrencies

'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software

9 years ago

Instagram Hack Promotes Porn Spam And Adult Dating

Symantec warns of Instagram profile hack that uses compromised accounts to promote adult dating websites

9 years ago

Patch Tuesday: Desktop Focus As Microsoft Tackles Office And Edge Flaws

Patch Tuesday: Admin tasks return to usual following recent Black Hat security conference, with patches for Office and browser flaws

9 years ago

FTC Commissioner Looking For Hackers’ Help With Consumer Privacy

FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…

9 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

9 years ago

Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil

Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games

9 years ago

State Of Ransomware: More Than Half Of UK Firms Are Victims

Crippling threat...20 percent of firms hit by ransomware had to cease business operations

9 years ago

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

9 years ago

Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In

BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…

9 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

9 years ago

ATM Hack Gives Attackers Cash And Account Data

BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures

9 years ago

Researchers Discover Major HTTP/2 Flaws

Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution

9 years ago

Kaspersky Lab Creates Bug Bounty Program

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

9 years ago

Ruckus Routers Found With Multiple Security Flaws

Tripwire research finds Ruckus routers are susceptible to intruders

9 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

9 years ago

Google Releases Customer-Supplied Encryption Keys For Cloud

Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine

9 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

9 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

9 years ago

SwiftKey Stops Cloud Sync Following User Data Leak

SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service

9 years ago

AdGholas Malvertising Campaign Closes After Proofpoint Discovery

AdGholas malvertising campaign closes after pulling in at least a million victim computers a day

9 years ago

Cyber Attack Uses Google Drive To Deliver 9002 Trojan

Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries

9 years ago

KeySniffer Flaw Exposes Wireless Keyboard Typing

Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away

9 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

9 years ago

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

9 years ago

BlackBerry Packs Good Dynamics Apps Into Microsoft Azure

Good Dynamics Secure Mobility Platform now available in Microsoft Azure Marketplace

9 years ago

ONS Figures Show UK Cybercrime Doubled In Past Year

Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime

9 years ago

‘Apple’s Stagefright’: iOS And Mac Users Urged To Update Immediately

iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…

9 years ago

HTTpoxy Flaw Re-emerges After 15 Years And Gets Fixed

After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…

9 years ago

Oracle Issues Its Largest Patch Update Ever

Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?

9 years ago