Security Management

RSA Conference 2016: What’s Old Security is New Again

BLOG: Kurt Stammberger, founder of the RSA Conference, sees the same issues in FBI vs. Apple as were brought to…

9 years ago

‘Fingerprinting’ Helps Malvertising Attacks Find Victims And Avoid Detection

Research shows more malvertising assaults are using 'fingerprinting' at an advert level to avoid unncessary attention and save bandwidth

9 years ago

Snapchat Employee Wage Details Leaked In Phishing Scam

Unfortunately, leaked Snapchat salary information didn't delete itself after ten seconds

9 years ago

Easy To Use Technology Causes DDoS Attacks to Rise Yet Again

Latest Akamai report sees 149 percent rise in DDoS attacks over last quarter of 2015

9 years ago

Baidu Browser Still Leaks Personal Data, Researchers Warn

Look Mum, no encryption! Baidu Browser transmits personal data in the clear, warns Citizen Lab researchers

9 years ago

How Many Mobile Users Have Encryption?

NEWS ANALYSIS: As the rhetoric and the legal motions in the Apple vs. FBI flap heat up, new numbers emerge…

9 years ago

Microsoft Boosts Office 365, Azure Security With Analytics And Visualisation Tools

Microsoft says new capabilities for its cloud services are part of a new vision of security outlined by Satya Nadella…

9 years ago

The Extortion Game – How To Approach DDoS

Dave Larson from Corero Network Security tells us how your business can best deal with the threat of DDoS attacks

9 years ago

Apple iPhone Unlocked With Play-Doh

This hack is child's play. Apple iPhone biometrics security beaten by a simple play-doh trick

9 years ago

Apple Tells US Court FBI Request Violates Free Speech

The iPad maker asks court to reserve its order to help the FBI hack into the iPhone of a terrorist…

9 years ago

Poll: Should Smartphone Makers Unlock Devices For Law Enforcement?

Apple is fighting a very public battle with the FBI over encryption. But should the industry do more? Let us…

9 years ago

Google Rolls Out Shield To Protect From DDoS Attacks

Free Project Shield service forms part of Google’s new Jigsaw initiative

9 years ago

Court Papers Confirm US Government Paid Carnegie Mellon To Hack Tor

US university credibility questioned after court documents show it was paid to hack Tor network

9 years ago

Apple CEO Tim Cook: FBI Request Would Create ‘Software Equivalent To Cancer’

Apple boss Tim Cook defends his company's stance in TV interview and refuses to create a "dangerous" piece of software

9 years ago

Nissan Leaf Can Be Hacked From Other Side Of The Planet

Researcher decides to go public with flaw after giving Nissan one month to fix the vulnerability

9 years ago

Understanding The Weapons Of Mobile Warfare

Michael Shaulov, head of mobility at Check Point, discusses the main threats targeting mobile devices – and how companies can…

9 years ago

Hackers Breach Linux Mint Distribution, Forums

Attackers manage to breach Linux Mint's security, adding a backdoor to the distribution and even stealing information from user forums.

9 years ago

Has Your Spotify Account Been Hacked?

Spotify denies it has been hacked, but hundreds of user details have been leaked in online data dump

9 years ago

How Not To Become A Ransomware Victim

Security software firm Tripwire offers cybersecurity advice to keep individuals and online retailers safe from ransomware

9 years ago

Hide And Seek: How To Avoid The Attribution Trap

Carl Leonard from Forcepoint tells us what companies can do to ensure their security protection is up to scratch

9 years ago

Twitter Patches Password Recovery Flaw

Oops. Bug with Twitter's password recovery system may have exposed account details of almost 10,000 users

9 years ago

Anonymous Hacker Arrested After Rescue By Disney Ship

You couldn't make it up! Rescued at sea by a Disney cruise ship, Anonymous hacker then arrested by the Feds

9 years ago

Apple Praised By Google, Damned By Rigby Family For FBI Refusal

Apple criticised for refusal to unlock terrorist phone, but its stance also receives widespread support from rivals

9 years ago

Instagram Adds Two-Factor Authentication For Extra Security

Your photos will now be secured as Instagram finally steps up user protection

9 years ago

‘Catastrophic’ Glibc Flaw Threatens Linux And IoT Devices

Patch now. GlibC DNS vulnerability could have serious reach amongst Internet-connected devices

9 years ago

More Than Half Of World’s Emails Are Spam And Malware

Mobile devices are now a particular focus for criminals' spam and malware attacks

9 years ago

Cloud Security Firm CensorNet Acquires SMS PASSCODE

Basingstoke-based CensorNet eyes global expansion with a unified cloud security offering

9 years ago

Privacy Watchdog Studies University of Greenwich Data Breach

Information Commissioner's Office investigates after students' private details are published online

9 years ago

Cisco Touts Benefits Of ‘Simplified’ Security For IoT Era With New Firewalls, Software

Cisco says its threat-focused next generation firewalls will help firms simplify their security and prevent overcomplication

9 years ago

PadCrypt Ransomware Boosts Customer Service With Live Chat

Newly discovered PadCrypt ransomware offers victims real-time interaction with attackers

9 years ago