ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security researcher and French network service provider
News Virus
MarsJoke Ransomware Targets US Government And Education Institutions
Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims
DDoS Attacks Heading Toward 1-Terabit Record
ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not looked at that way
Yahoo, LinkedIn, Apple iCloud: 10 Big Data Breaches
Data breaches from hack attacks continue to get bigger and bolder but which of these do you remember?
What Should You Do After Massive Yahoo Hack?
ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next
Sky And BT Email Users Are Caught Up In Yahoo Password Hack
Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach
Latest iOS 10 Security Features Help Apple’s Business Case
ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according to mobile-device management experts
Hackers Are Using Consumer IoT Devices To Launch DDoS Attacks
Lax IoT security is allowing cyber criminals to syphon bandwidth to launch attacks on big businesses
Apple macOS Sierra Fixes 68 Vulnerabilities
macOS Sierra isn't just a pretty face. Apple has patched quite a few security flaws, including one that affects Docker
Malicious Android Apps Due To Increase By 400 Percent In 2016
Webroot's threat intelligence data identifies Asian countries as a hotbed of malicious IP addresses
Hackers Seize Control Of Tesla Model S From 12 Miles Away
Keen Security Lab researchers discover a cyber vulnerability in Tesla's connected car
Android Scam Call And SMS Security Is Undone By HTML Exploiting Malware
Android's built-in protection which flags warnings about apps trying to send premium rate messages without user consent can be manipulated by malware.
Microsoft Isn’t Patching ‘Significant’ Windows Safe Mode Flaw
Researchers say Windows 10 Safe Mode flaw is easy to exploit but Microsoft doesn't acknowledge it as a primary threat
Google Pulls Four Overseer Spyware Infected Apps From The Play Store
The spyware harvested user and device data from infected Android smartphones
Google Chrome And Mozilla Firefox Browsers Block The Pirate Bay
Big browsers take another shot at the tormenting website
Bruce Schneier: ‘Someone Is Learning How to Take Down the Internet’
Security expert Bruce Schneier suspects state-sponsored DDoS attacks are being levied at major internet infrastructure providers to test cyber defences
Ransomware Forces Hospitals To Payout $100,000 To Cyber Criminals
Intel Security cyber threat data idetifies the legacy IT of hospital as vulnerable to hackers
One Year Post-IPO, Sophos Extending Its Security Platform
Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016
Moke Malware Hops Over From Windows And Linux To Threaten Mac OS X
Backdoor.OSX.Mokes can swipe data from Apple's operating system
Google Patches 55 Android Vulnerabilities in September Update
More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for 55 vulnerabilities
Linux Networking Flaw Allows Attacker To Trick Safety Mechanism
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
Linux Trojan Written In Go Mines For Cryptocurrencies
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
FTC Commissioner Looking For Hackers’ Help With Consumer Privacy
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes a plea to hackers
Windows 10 Linux Feature Brings Real, But Manageable Security Risks
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because of potential security risks
Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and infect devices
Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run Linux
Why Airbnb Users And Hosts Must Beware Of WiFi Risks
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be at risk
Black Hat USA and DefCon: Finding Security Risks in All the Things
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why firms should trust telcos