Lancashire Police are seeing how people could submit evidence and receive information about crimes using Amazon Echo
News Virus
IT LIFE: Nico Fischbach, Forcepoint CTO
Forcepoint's Global CTO Nico Fischbach discusses the future of security, his networking background and why he might open a restaurant
Newly Discovered Android Malware Physically Wrecks Phones
The Loapi malware, which poses as adult or security apps, runs processor-intensive scams that can cause a phone to overheat and deform its case
TRITON Attack Targeted Critical Infrastructure, Security Firm Says
FireEye warns that a nation-state appears to be infiltrating critical-infrastructure sites and developing ways to cause physical damage
1998 Vintage Cryptography Vulnerability Known As ROBOT Re-Emerges
The Cryptography vulnerability first detailed in 1998, still has the potential to impact modern websites
US Law Bans Kaspersky Security Products From Government Systems
US government passes law that bans government agencies from using Kaspersky Lab security tools
How Facebook Users Can Thwart Imposters Who Spoof Their Identities
ANALYSIS: Scammers are spoofing the Facebook user's account names to engage in phony Messenger conversations to phish for information. Here's how to stop it
Former NSA Employee Pleads Guilty To Taking Top Secret Data Home
ANALYSIS: Yet another former NSA employee has taken secret information home, allegedly enabling Russian hackers to gain access to data.
PayPal’s TIO Networks Says Data Breach Impacts 1.6m Customers
PayPal only bought bill payment processor TIO Networks For £177m in July but has suspended operations
MPs’ Cybersecurity Admissions Highlight Need For Culture Change At Westminster
ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better
Morrisons ‘Ultimately Responsible’ For Rogue Employee Leaking Payroll Data
Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online
McAfee To Buy Skyhigh Networks In Cloud Cybersecurity Push
McAfee's first major acquisition as an independent security firm is Skyhigh Networks
NHS Boosts Cybersecurity With Ethical Hackers, Real Time Monitoring & SMS Alerts
NHS Digital plots £20m division to help stop another WannaCry attack
‘Concerned’ UK Regulators Look Into Uber’s Hidden Data Breach
ICO and NCSC are looking into the scale of the Uber hack before they take next steps
Security Panel: What On Earth Was Uber Thinking?
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and drivers be sure?
Five Steps To Keep North Korean Hackers Out Of Your Network
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can keep them from getting the data they want
CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software
IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software and IoT
North Korea Getting Ready Wage A Global Cyber War, Experts Say
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch a global cyber-attack
Cash Converters Admits Data Breach After Website Hack
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack
Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code and files stolen
MIT Helping To Define New Model To Restore Trust In Cyber-Security
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data privacy for cyber-security
Apple iPhone X Face ID ‘Is Tricked’ By 3D Printed Mask
Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure
IT LIFE: Toni Gidwani, Threat Connect
ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks of recent times
Sowbug Hacking Group Targets South America & Asian Governments
Previously unknown hacking group found targeting foreign policy and diplomatic targets
ICO Warns That Lack Of Trust With Data Use Could Harm Innovation
ICO prioritises reducing 'trust deficit' head of GDPR next year
News Of NYC Terror Attack Changes Focus Of Senate Social Media Hearing
ANALYSIS: Experts on international terrorism turn from describing how terrorists use social media to reporting the level of chatter on Islamist networks
North Korea Slams UK Claims It’s To Blame For WannaCry
The nation dismisses Britain's security minister's claims as "groundless speculation"
Bad Rabbit Ransomware Hits Russia And Ukraine
The ransomware appears to be a variant of the Petya ransomware