Law enforcement could get their hands on call data if it is sent to iCloud for 'no reason', claims Russian firm
News Virus
Symantec: Hackers Are Becoming Expert IP Hunting Professionals
Fujitsu Forum 2016: Cyber crime can now be considered a professional, targeted business, according to Symantec
DocuSign Opens Cybersecurity Centre In Dublin
DocuSign continues European expansion with cybersecurity investment in the Irish capital
Yahoo Investigates Cookie Powered Password Bypass Hack
The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny
Splunk: Machine Data Could Be The Key To Tackling Cyber Threats
INTERVIEW: Splunk's security evangelist Matthias Maier talk bolstering cyber defences with machine data
Darktrace: Machine Learning Will Filter Through The Noise Of Cyber Security
INTERVIEW: Machine learning can help filter the increasing noise on complex IT networks to spot the emerging cyber threats that pressured tech teams might miss.
Machine Learning And AI Could Be The Future Of Cyber Security
IN-DEPTH: As the war against malware rages, smart software could be the key to getting ahead of hackers
Zero-Day Security Hole In Wix Hosting Service Exposed Millions Of Websites
Infected sites could have been turned into botnets to launch DDoS attacks and spread malware
National Cyber Security Centre Head: Fearmongering Must Be Replaced With Facts
National Cyber Security Centre chief Dr Ian Levy wants an empirical, transparent approach to cybersecurity policy - not hysteria
Facebook Blocks Insurance Firm Admiral From Using Profile Data
Is Facebook a privacy champion? Admiral banned from using FB data in order to price insurance policies
UK Government Pledges ‘To Strike Back’ In Cyberwar As It Invests £1.9bn In Cybersecurity
Philip Hammond outlines the government's new cybersecurity strategy and how £1.9 billion will boost defences, enable law enforcement and aid country
ShadowBrokers Data Dump Leaks Compromised Servers Used By NSA For Hacking Operations
The servers are claimed to have been used by NSA-sponsored Equation Group as staging areas for covert hacking activity
Lincolnshire Hospitals Cancel Operations After Their IT Suffers Virus Infection
The hospital has been forced to shut down it IT network to seek out and destroy the virus
Google’s AI Neural Networks Learn To Create Their Own Encryption
Two neural nets were created to communicate securely while a third tried to crack their inhuman cipher messages
Microsoft Azure IoT Protects Against Cyber Attacks With Expert-Driven Security Program
Third-party security auditors will be brought in to help Microsoft Azure customers secure their Internet of Things deployments
Massive Cyber-Attack Shows Risk Of Poor Security On Network Nodes
ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas of the internet are still unclear, insecure endpoints are the likely culprit
What Makes Ransomware the Worst Type of Malware
In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in mind for the U.S
Oracle Fixes 253 Security Flaws In October Update
Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.
Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild
The bug affects most versions of Linux potentially exposing huge numbers of machines to hackers
Malwarebytes Snaps-Up French Startup AdwCleaner
The acquisition gives Malwarebytes access to the startup's adware an unwanted programe fighting tool
Selfie Stealing Android Trojan Discovered By McAfee Labs
Tweaked Acecard trojan aims to trick gullible Android users into sending selfies and photos of their IDs
Symantec Spots Student Scam Powered By Ascesso Trojan
Scammers are trying to trick students into paying for application to the US student loan forgiveness programme
Facebook Twitter & Instagram Ban Data Monitoring App Geofeedia
New privacy row as social networking sites halt access by data gathering app used by law enforcement
US Military Looks To Blockchain To Secure Weapon Data And Nukes
Is Blockchain a possible solution for securing weapons data for the US military, including its nuclear capabilities?
Cyber Criminals Using Odinaff Trojan To Infiltrate Bank Systems
Symantec has discovered a trojan capable of hiding in the networks of financial institutions
Persistent Warnings Are Causing ‘Security Fatigue’
People are becoming weary of constant security advice and businesses could pay the price for poor decisions, a report has claimed
IoT And The Enterprise World Must Put Cyber Security At The Forefront Warn Experts
IP Expo 2016: Sophos, Kaspersky and Trend Micro talk future threats from IoT, Hired cyber criminals, and security education
Turkey, Italy And Hungary Riddled With Botnets Finds Norton Research
Botnets hop on high-speed city infrastructure to fire malware, spam and other threats across the Internet
Shellshock Bug Back And Stronger Than Ever
IBM Managed Security Services identifies poor server patching as the reason for the bug's survival
Federal Agencies Working With States to Guard Voter Data Security
Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in securing election systems