Virus

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

8 years ago

‘Apple’s Stagefright’: iOS And Mac Users Urged To Update Immediately

iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…

8 years ago

HTTpoxy Flaw Re-emerges After 15 Years And Gets Fixed

After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…

8 years ago

Oracle Issues Its Largest Patch Update Ever

Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?

8 years ago

Researchers Warn Of Rio 2016 Malware As Olympic Searches Return Threats

Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised

8 years ago

CryptoDrop Promises To Stop Ransomware In Its Tracks

University of Florida researchers say the answer to stopping ransomware is to let it onto your system first

8 years ago

Avast Buys AVG For £1bn In Bid To Become Czech IoT Security Giant

Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices

8 years ago

Firmware Flaw Affects Lenovo ThinkPads, Other PC Makers’ Hardware

ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…

8 years ago

Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?

Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…

8 years ago

Serious Vulnerabilities In Symantec Products Are ‘As Bad As It Gets’

Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users

8 years ago

Office 365 Users Hit By ‘Widespread’ Ransomware Attack

But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours

8 years ago

ICO: Future UK Data Protection Laws Must Equal Those Of EU

Safe Habour advice. British data protection act should be used when transferring data to US, says ICO

8 years ago

iOS 10 Developer Preview Has An Unencrypted Kernel

The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security…

8 years ago

Will MPs’ TalkTalk Hack Recommendations Make The UK More Secure?

INDUSTRY VIEW: Security experts examine parliamentary select committee's proposals for data breach compliance, enforcement and awareness

8 years ago

Euro 2016: What Are The Biggest Security Threats?

Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…

8 years ago

Infosec 2016: Shadow IT Lets Employees Take Company Data To New Jobs

Blue Coat research shows significant amounts of cloud use in firms is not sanctioned

8 years ago

Lessons From Mark Zuckerberg’s Social Networking Account Breach

ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…

8 years ago

New Trojan Uses Zeus Tricks To Target Russian Banks

Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems

8 years ago

Investigatory Powers Bill Given Cautious Support By Human Rights Committee

Journalist sources must be protected says committee of MPs, but admits bulk data collection can be justified

8 years ago

Visit TechWeekEurope At Infosec 2016 And Win An Apple Watch

TechWeekEurope will be at Europe's biggest cybersecurity event next week, speaking to the biggest names in the field and sharing…

8 years ago

Microsoft Boosts Office 365 Security With Threat Detection, Visibility Tools

Microsoft says Advanced Security Management can protect networks and make Office 365 deployments more effective with new dashboard

8 years ago

US Police Don’t Need A Warrant To Track Mobile Users

Privacy setback? US appeals court rules police don't need warrant to obtain cell tower records from mobile operators

8 years ago

Web Publishers Need To Address Reasons Why Readers Install Ad Blockers

ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their…

8 years ago

Security For Google’s New Home Assistant May Get Lost On The IoT

GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think…

9 years ago

How To Maximise Data Protection In Today’s Threat Landscape

Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their…

9 years ago

Hacking Forum Hack Exposes 473,000 Members And 2.2m Posts

Nulled.IO forum used to sell credentials and cracks is itself hacked, potentially allowing law enforcement to solve other attacks

9 years ago

How Fuzzing Can Make A Large Open Source Project More Secure

Emily Ratliff of the Linux Foundation explains the considerations to take when planning to fuzz your open source project

9 years ago

Facebook Blocked From Taking Biometric Data From Users

California court rules that social media giant should not have access to personal details garnered from photographs

9 years ago

RSA: The World Is Not Ready For IoT

Security specialists at RSA have warned that too many companies have implemented IoT "security through obscurity"

9 years ago

Google Encrypts All Blogspot Domains With HTTPS

Google switches on Blogspot HTTPS by default, allowing admins and users an opportunity to encrypt their traffic

9 years ago