Virus

WhatsApp Denies It Has Compromised Encryption With ‘Backdoor’

UPDATED: Researcher says WhatsApp can reissue encryption keys for offline devices, compromising privacy. WhatsApp says there is no backdoor and…

8 years ago

Rudy Giuliani Is To Head Donald Trump’s Cybersecurity Taskforce

Former major of New York Giuliani accepts position as leader of Donald Trump's new cybersecurity team

8 years ago

Swiss-US Privacy Shield Mimics EU Data Sharing Arrangement

Switzerland's Privacy Shield data transfer agreement with the US is similar to the EU, aiding multinationals and offering potential Brexit…

8 years ago

DHS Designates Election Machines, Systems As ‘Critical Infrastructure’

Individual states will still have oversight and control over their election systems, but the move makes a statement “domestically and…

8 years ago

Avast Adds Fresh Security Tech Into AVG 2017 Suite

AVG 2017 not has access to Avast's CyberCapture tool for real-time threat detection

8 years ago

FTC Suit Against D-Link Warns All IoT Device Makers To Boost Security

ANALYSIS: Despite claims about advanced security, the FTC says D-Link hard-coded login credentials leaving encryption keys unprotected and publicly exposed

8 years ago

Google Patches Android For 90 Vulnerabilities In January Update

Google starts the new year with another large security update for Android, once again patching mediaserver, Qualcomm and Linux kernel…

8 years ago

Intel & BitDefender Target Smart Home Security

CES 2017: Lock it down. Security players tout offerings to secure smart homes of the future

8 years ago

New Android Switcher Trojan Spreading Through Wi-Fi Routers

The trojan hijacks DNS servers and replaces them with malicious versions to re-direct web traffic

8 years ago

Expect 2017 Cyber-Attacks To Far Surpass 2016 In Damage, Frequency

ANALYSIS: Constant bad news about Russian hacking and the increasing prevalence of ransomware made 2016 an IT security disaster... but…

8 years ago

Security Vulnerabilities Found In Airline Entertainment Systems

IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access

8 years ago

MobileIron CEO: Windows 10 Lets Us Manage PCs Like Mobiles

INTERVIEW: MobileIron CEO Barry Mainz tells Silicon about PC management, the rise of IoT and why it is better equipped…

8 years ago

Mirai UK Botnet Consists Mostly Of TalkTalk Routers

The Mirai botnet has spread like wildfire and now infects 2,398 home routers across the UK, with 99 percent of…

8 years ago

IBM Watson for Cyber Security Expands With Beta Launch

40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…

8 years ago

Fake News Campaigns to Increase in Frequency, Security Experts Say

ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…

8 years ago

Scottish Football Association Suffers Third-Party Data Breach

"I'd rather be associated with being hacked by some porn site," says one unhappy football fan

8 years ago

MAD Concept Of Deterrence Doesn’t Apply In World Of Cyber War

ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…

8 years ago

Talk Talk And Post Office Broadband Taken Offline After Mirai Botnet Hack Attack

Mirai botnet strikes again, attacking routers and cutting-off broadband

8 years ago

Up To 26,500 National Lottery Online Accounts Are Breached

National Lottery and experts suggest accounts breached by reusing compromised credentials

8 years ago

Black Friday, Cyber Monday Bring Open Season for Cyber-Criminals

ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…

8 years ago

Election Recount Unlikely To Reveal Evidence Of Vote System Hacking

ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…

8 years ago

Ask Search Bar Adware Exploited By Malicious Actor To Deliver Malware

Malicious actors have been found to be using the Ask search bar software to distribute malware of its users machines

8 years ago

How To Protect The Encryption Keys To Your Kingdom

ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…

8 years ago

Android Fake Email App Trojan Takes Aim At German Banks

Android malware appears to be increasingly tailored to target specific banking services

8 years ago

Qualcomm Bug Bounty Offers Up To £12,000 For Snapdragon Flaws

Qualcomm is offering up to $15,000, approximately £12,000, to people who spot bugs in its modems and processors.

8 years ago

Symantec Acquires LifeLock For £1.9bn To Boost Norton Division

The security giant looks to turn its ailing consumer security software division

8 years ago

Snooper’s Charter 2.0 Is Set To Become Law As Lords Pass Controversial IP Bill

ISPs set to be required to keep your internet search history on record for at least a year in order…

8 years ago

Apple ‘Sends iPhone Call History To iCloud’

Law enforcement could get their hands on call data if it is sent to iCloud for 'no reason', claims Russian…

8 years ago