Search engines, social networks and e-commerce websites will have to comply with EU security measures
News Security Management
Tesla Issues Patch After Serious Car Hack
A hack that allowed researchers to gain control of Tesla's electric vehicle has now been patched
New Techniques Could Prevent Use-After-Free Exploits: Black Hat
The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that and eliminate many UAF bugs
Open Network Switches Pose Security Risk, Researcher Says
At the Black Hat show, a security expert demonstrates how vulnerable SDN switches that use the ONIE software are open to attacks by hackers
Watch Out: That Windows 10 Update Might Be Ransomware
Bitdefender study reveals criminals are sending out Windows 10 upgrade emails to disguise CTB Locker ransomware
Android Fingerprint Readers Are Also A Security Risk
It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find
Texas Drone Uncovers Scale Of IoT Security Worries
Austin-based drone discovers details of 1,600 IoT devices in just a few neighbourhoods
Samsung, Google Nexus Devices To Get Monthly Android Security Updates
Smartphones and tablets will be among the first to benefit from incremental updates to Android
Beware – Your Smart Home Might Be A Massive Security Risk
Tripwire survey finds zero-day vulnerabilities in many of the leading smart home hubs
FBI Called In To Investigate Hillary Clinton Email Set-Up
FBI agents are looking into the security of the presidential hopeful’s private account
BIND Flaw Opens Door To Hacker Attacks On DNS
Patch now! BIND flaw is being exploited by hackers and websites can be taken offline, researchers warn
Employees Just Don’t Care About Keeping Company Data Safe With BYOD
Kaspersky survey finds only one in ten workers bothering to keep work files safe from cyber attack
Two Major Mac OS X Vulnerabilities Bring Apple Security Approach Under Scrutiny
Researchers find exploit for previously known vulnerability and create firmware worm that can spread without physical network
Q&A With Black Hat, DEF CON Founder Jeff Moss
Jeff Moss, consultant and former hacker offers his takes on trends, privacy, machine learning - and why you should always keep your keys in your pocket
How Finance Firms Can Reduce Data Security Risk
IT outsourcing and managed services specialist, Advanced 365, offers its top tips on defending against new cyber threats
Could Your Phone’s Battery Be Spying On You?
Researchers reveal that a flaw in HTML5 API can be used to track users across the web
How To Protect Your Business From A DDoS Attack
Margee Abrams, security services product marketing at Neustar, a real-time information and analytics firm, says criminals will steal from you – and you will suffer a DdoS attack
Mobile Malware ‘Grows Almost Three-Fold’ In Just Three Months
However the total number of global threats in Q2 2015 fell 19 percent, Kaspersky Labs reports
Porn Clampdown By Government Questioned
Plan to stop kids accessing smut ignores the fact that most porn websites are hosted outside the UK
Vendors Finding Value in Bug Bounty Programs
Bugcrowd report examines 30 months of bug bounty submissions across 166 programs, finds crowdsourced security is gaining industry-wide adoption
Google Roadshow To Train UK For Online Safety
Google undertakes country-wide roadshow to train Brits about online safety and security
ARM Splashes Cash On Israeli IoT Security Firm
Acquisition of Sansa Security will offer hardware and software-based security features for ARM's IoT chips
Three Awesome Windows 10 Security Features
Will Windows 10 be more secure than previous versions? These security features should help
Google To Let Cloud Customers Use Own Keys To Encrypt Data
Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says
Researchers Demo Tor Network Vulnerability
We are protecting Internet users anonymity researchers say, after successfully attacking Tor network
Consumers Distrust Businesses With Personal Data
Where has the trust gone? Businesses no longer trusted when it comes to handling people's personal data
Would You Sell Company Data To Pay For A Holiday? Many Would…
What price some summer sun? Enough to pay for a trip to Jamaica, apparently
Top 5 Ways To Boost Business IT Security
Roger Keenan, managing director of London data centre City Lifeline shares his top tips on protecting data
US Treasury Computer System Was Open To Hack
Shoddy government security? Vital intelligence system for US financial system was vulnerable to hackers
Your Smartwatch Could Be A Major Security Risk
100 percent of smartwatches tested by HP Security showed major flaws