Security researchers warn of a serious stack overflow vulnerability in a number of devices from D-Link
News Security Management
Avast Buys AVG For £1bn In Bid To Become Czech IoT Security Giant
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
Apple Mac Malware Gives Backdoor Access And Webcam Control
Malware targets OS X and gives attackers webcam access via Tor and full access of compromised Mac
Darktrace Raises £50m Funding For Cyber Defence Push
Another round of funding for cyber-security firm backed by former Autonomy boss Mike Lynch
Firmware Flaw Affects Lenovo ThinkPads, Other PC Makers’ Hardware
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create their BIOS firmware
Sharp Rise In Identity Theft Among Young UK Adults
Media savvy Millennials still falling for same tricks as fraud rockets 52 percent among those under 30
InfoSec 2016: Why Ransomware Should Be Your Number One Concern
VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware
Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access to data
Android Malware Disguises Itself As WhatsApp, Uber And Google Play
Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data
Serious Vulnerabilities In Symantec Products Are ‘As Bad As It Gets’
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
Blindspotter Uses Machine Learning To Find Suspicious Network Activity
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network, but privileged users were the weak point until now.
NASCAR Team Partners Malwarebytes After Ransomware Attack
Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware
US Customs To Request Social Media Data For Passengers
Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States
Office 365 Users Hit By ‘Widespread’ Ransomware Attack
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours
ICO: Future UK Data Protection Laws Must Equal Those Of EU
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO
InfoSec 2016: Government Is Doing “An Awful Lot” On Cyber Security
But Intel Security’s Gordon Morrison says that a growing skills gap could be a worry
Study Claims HMTL5 Isn’t Much More Secure Than Flash
Flash not so bad? New report casts doubts on HTML5 adverts being safer than Adobe Flash
Cisco Warns Of Libarchive File Compression Flaw
Patch it now! Popular open source file compression tool libarchive contains wide reaching vulnerabilities
Unknown Connections On LinkedIn Can Compromise Enterprise Security
Intel Security says employees are not being educated about the risks of adding people they don't know on LinkedIn amid fears of spear phishing attacks
iOS 10 Developer Preview Has An Unencrypted Kernel
The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security flaws
Will MPs’ TalkTalk Hack Recommendations Make The UK More Secure?
INDUSTRY VIEW: Security experts examine parliamentary select committee's proposals for data breach compliance, enforcement and awareness
BadTunnel Security Flaw Affected All Windows Versions For 20 Years
Discovery of serious Windows vulnerability, dubbed BadTunnel, earns researcher top bug bounty reward
InfoSec 2016: IoT Security Needs A Serious Shake-Up, Says Sophos
Sophos researcher tells us why flaws in the toys of today could cause major security worries in the future
InfoSec 2016: Businesses, Beware The Ransomware Threat, Says Rik Ferguson
More co-operation between industry and government is also needed to tackle growing threats, Trend Micro VP tells TechWeekEurope
GitHub Accounts Compromised In Password Attack
Fallout from LinkedIn breach seems to continue as GitHub admits some accounts were accessed by attacker
Criminal Marketplace Offers Cheap Server Access For Global Cyber-Attacks
Fancy a DDoS attack? Cybercrime marketplace offers access to compromised third party servers for just £4.23
Patch Tuesday Tackles Browser Flaws Amid Another Adobe Zero-Day
Fixes for Edge and Internet Explorer, but admins warned to pay attention to serious Adobe Flash zero day
Donald Trump Data Pilfered After Democrat Hack By Russians
Democrat computer hacked by Russian intelligence agencies and lifted opposition data on 'The Donald'
Euro 2016: What Are The Biggest Security Threats?
Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro 2016
Malicious Documents Use New Tricks To Evade Detection, Warns Zscaler
Attackers utilise social engineering to lure MS Word users to enable macros in order to avoid cyber detection