BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer, despite risk
News Security Management
Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run Linux
ATM Hack Gives Attackers Cash And Account Data
BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures
Researchers Discover Major HTTP/2 Flaws
Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution
Kaspersky Lab Creates Bug Bounty Program
Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products
Ruckus Routers Found With Multiple Security Flaws
Tripwire research finds Ruckus routers are susceptible to intruders
Why Airbnb Users And Hosts Must Beware Of WiFi Risks
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be at risk
Google Releases Customer-Supplied Encryption Keys For Cloud
Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine
Black Hat USA and DefCon: Finding Security Risks in All the Things
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why firms should trust telcos
SwiftKey Stops Cloud Sync Following User Data Leak
SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service
AdGholas Malvertising Campaign Closes After Proofpoint Discovery
AdGholas malvertising campaign closes after pulling in at least a million victim computers a day
Cyber Attack Uses Google Drive To Deliver 9002 Trojan
Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries
KeySniffer Flaw Exposes Wireless Keyboard Typing
Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away
Cisco: Ransomware Is Only Going To Get Worse
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report
DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the data breach might have been much worse
BlackBerry Packs Good Dynamics Apps Into Microsoft Azure
Good Dynamics Secure Mobility Platform now available in Microsoft Azure Marketplace
ONS Figures Show UK Cybercrime Doubled In Past Year
Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime
‘Apple’s Stagefright’: iOS And Mac Users Urged To Update Immediately
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw that affects all versions
HTTpoxy Flaw Re-emerges After 15 Years And Gets Fixed
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP, Go and Python, have now been fixed
Oracle Issues Its Largest Patch Update Ever
Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?
Code Hooking Opens Security Product Vulnerability
Fresh concern raised about the security of the very products designed to protect users from cyber nastiness
Researchers Warn Of Rio 2016 Malware As Olympic Searches Return Threats
Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised
Mobile Malware Threat Grows As HummingBad Infection Reaches 85m
Depressing reading as active malware families grow and HummingBad infects 85 million Android devices
BAE Systems Joins SWIFT Security Team
Forensic experts join SWIFT to help prevent customer fraud and bolster community security
Stampado Ransomware Starts Deleting Files If No Payment Is Made
The clock is ticking. Ransomware victims have just 96 hours to cough up or it begins deleting files
Ranscam Malware Poses As Ransomware But Just Deletes Your Files
Malware dubbed 'ranscam' asks for payment to unlock files, but in reality has already deleted them
Patch Tuesday: Routine For Microsoft, Adobe Is More Pressing
Routine fixes for Office and web browsers, but no flaws are being actively exploited in the wild
CryptoDrop Promises To Stop Ransomware In Its Tracks
University of Florida researchers say the answer to stopping ransomware is to let it onto your system first
Facebook Messenger Tests End-to-End Encryption
Playing catch up? Facebook tests encrypted "secret conversations" after last month's security scare concerning chats