Security Management

InfoSec 2016: Why Ransomware Should Be Your Number One Concern

VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware

9 years ago

Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?

Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…

9 years ago

Android Malware Disguises Itself As WhatsApp, Uber And Google Play

Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data

9 years ago

Serious Vulnerabilities In Symantec Products Are ‘As Bad As It Gets’

Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users

9 years ago

Blindspotter Uses Machine Learning To Find Suspicious Network Activity

The use of machine learning to identify suspicious online activity is a new and important capability in securing the network,…

9 years ago

NASCAR Team Partners Malwarebytes After Ransomware Attack

Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware

9 years ago

US Customs To Request Social Media Data For Passengers

Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States

9 years ago

Office 365 Users Hit By ‘Widespread’ Ransomware Attack

But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours

9 years ago

ICO: Future UK Data Protection Laws Must Equal Those Of EU

Safe Habour advice. British data protection act should be used when transferring data to US, says ICO

9 years ago

InfoSec 2016: Government Is Doing “An Awful Lot” On Cyber Security

But Intel Security’s Gordon Morrison says that a growing skills gap could be a worry

9 years ago

Study Claims HMTL5 Isn’t Much More Secure Than Flash

Flash not so bad? New report casts doubts on HTML5 adverts being safer than Adobe Flash

9 years ago

Cisco Warns Of Libarchive File Compression Flaw

Patch it now! Popular open source file compression tool libarchive contains wide reaching vulnerabilities

9 years ago

Unknown Connections On LinkedIn Can Compromise Enterprise Security

Intel Security says employees are not being educated about the risks of adding people they don't know on LinkedIn amid…

9 years ago

iOS 10 Developer Preview Has An Unencrypted Kernel

The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security…

9 years ago

Will MPs’ TalkTalk Hack Recommendations Make The UK More Secure?

INDUSTRY VIEW: Security experts examine parliamentary select committee's proposals for data breach compliance, enforcement and awareness

9 years ago

BadTunnel Security Flaw Affected All Windows Versions For 20 Years

Discovery of serious Windows vulnerability, dubbed BadTunnel, earns researcher top bug bounty reward

9 years ago

InfoSec 2016: IoT Security Needs A Serious Shake-Up, Says Sophos

Sophos researcher tells us why flaws in the toys of today could cause major security worries in the future

9 years ago

InfoSec 2016: Businesses, Beware The Ransomware Threat, Says Rik Ferguson

More co-operation between industry and government is also needed to tackle growing threats, Trend Micro VP tells TechWeekEurope

9 years ago

GitHub Accounts Compromised In Password Attack

Fallout from LinkedIn breach seems to continue as GitHub admits some accounts were accessed by attacker

9 years ago

Criminal Marketplace Offers Cheap Server Access For Global Cyber-Attacks

Fancy a DDoS attack? Cybercrime marketplace offers access to compromised third party servers for just £4.23

9 years ago

Patch Tuesday Tackles Browser Flaws Amid Another Adobe Zero-Day

Fixes for Edge and Internet Explorer, but admins warned to pay attention to serious Adobe Flash zero day

9 years ago

Donald Trump Data Pilfered After Democrat Hack By Russians

Democrat computer hacked by Russian intelligence agencies and lifted opposition data on 'The Donald'

9 years ago

Euro 2016: What Are The Biggest Security Threats?

Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…

9 years ago

Malicious Documents Use New Tricks To Evade Detection, Warns Zscaler

Attackers utilise social engineering to lure MS Word users to enable macros in order to avoid cyber detection

9 years ago

uTorrent Hack Exposes Account Details And Passwords

Undergound data breach. Up to 35,000 user accounts on the uTorrent community forums exposed after hack

9 years ago

Twitter Denies Major Password Breach

More than 32m user passwords appear online, but Twitter claims no breach occurred

9 years ago

Infosec 2016: Shadow IT Lets Employees Take Company Data To New Jobs

Blue Coat research shows significant amounts of cloud use in firms is not sanctioned

9 years ago

How To Manage Cyber Vulnerability In A Threatening World

Nine tenths of UK organisations feel vulnerable to cyber threats – where should your priorities lie?

9 years ago

Lessons From Mark Zuckerberg’s Social Networking Account Breach

ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…

9 years ago

New Trojan Uses Zeus Tricks To Target Russian Banks

Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems

9 years ago