secure-it

Akamai Warns Of ‘Mega Attacks’ As DDoS Numbers Double Again

DDoS attacks are getting less powerful but lasting longer - apart from increasingly frequent mega attacks capable of taking out…

9 years ago

The New Cyberattacks Threatening Public Sector Companies

Targeted attacks on public utilities and governments are intensifying, Trend Micro report finds

9 years ago

Darkode Suspect Pleads Guilty Of Selling Botnet Access

A New York man arrested in the raids on Darkode hackers last month admitted to selling access to systems compromised…

9 years ago

Advanced Persistent Threats Going Unnoticed By Website Owners

Websites are failing to cope with Advanced Persistent Threats (APTs), despite many of them not being advanced at all, says…

9 years ago

Google Fixes Broken Stagefright Patch

Google acknowledged a flaw in its first patch for the Stagefright issue, which affects nearly 1 billion Android devices

9 years ago

Kaspersky Denies ‘False Positive’ Campaign Against Rivals

Kaspersky Lab has denied a report that it manipulated antivirus data to harm competitors including Microsoft, Avast and AVG

9 years ago

How To Overcome Digital Forensic Challenges In The Cloud

Professor Hamid Jahankhani, head of doctoral Studies at GSM London, gets all CSI in the cloud environment

9 years ago

Julian Assange Assault Probe Dropped, As UK Protests

Investigation into sexual assault claims against Julian Assange have been dropped, but the rape accusation still stands

9 years ago

Dropbox Bulks Up Chrome Security With USB Two Factor Authentication

Dropbox now supports USB U2F two factor authentication to protect users from phishing during the login process

9 years ago

Patch Tuesday Tackles Windows 10 Fixes

Microsoft welcomes its newest operating system, Windows 10, to its Patch Tuesday update cycle

9 years ago

The Smart City Vs The Safe City

Tony Burton, director of Protection Systems at Thales UK, discusses how smart and safe cities have challenges ahead in the…

9 years ago

How To Explain A Trojan Horse To A Five-year-old

The definitive definition of a Trojan Horse from the experts for the kids (and grown ups, too)

9 years ago

Memory ‘Sinkhole’ Lets Attackers Take Control Of Intel Chips

A hardware flaw detailed at Black Hat allows attackers to take control of Intel chips' most privileged mode

9 years ago

Researchers Detail ‘Severe’ Mobile Fingerprint Flaws

Attackers can hijack fingerprint-protected transactions and harvest fingerprints from mobile devices, according to FireEye

9 years ago

Facebook ‘Loophole’ Allows Personal Data Harvesting

Facebook dismissed claims that the technique could be used to build massive scam databases

9 years ago

Internet Security ‘Undermined By Random Number Weaknesses’

The random numbers used by web cryptographic systems aren't random enough, say security researchers

9 years ago

‘Certifi-Gate’ Security Flaw Hits Millions Of Android Devices

Smartphones from LG, Samsung, HTC and ZTE could all be at risk, Check Point team warn

9 years ago

Watch Out: That Windows 10 Update Might Be Ransomware

Bitdefender study reveals criminals are sending out Windows 10 upgrade emails to disguise CTB Locker ransomware

9 years ago

How To Configure Windows 10 Privacy Like A Pro

Bitdefender’s Catalin Cosoi share his tips on how to set up Windows 10 to ensure you stay safe online

9 years ago

Android Fingerprint Readers Are Also A Security Risk

It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find

9 years ago

Texas Drone Uncovers Scale Of IoT Security Worries

Austin-based drone discovers details of 1,600 IoT devices in just a few neighbourhoods

9 years ago

Samsung, Google Nexus Devices To Get Monthly Android Security Updates

Smartphones and tablets will be among the first to benefit from incremental updates to Android

9 years ago

Beware – Your Smart Home Might Be A Massive Security Risk

Tripwire survey finds zero-day vulnerabilities in many of the leading smart home hubs

9 years ago

FBI Called In To Investigate Hillary Clinton Email Set-Up

FBI agents are looking into the security of the presidential hopeful’s private account

9 years ago

Why Google Has Yet To Fix Chromecast Flaw One Year Later

NEWS ANALYSIS: Not all public exploits get patches—and sometimes there are even good reasons why. That's the case with a…

9 years ago

BIND Flaw Opens Door To Hacker Attacks On DNS

Patch now! BIND flaw is being exploited by hackers and websites can be taken offline, researchers warn

9 years ago

Employees Just Don’t Care About Keeping Company Data Safe With BYOD

Kaspersky survey finds only one in ten workers bothering to keep work files safe from cyber attack

9 years ago

Two Major Mac OS X Vulnerabilities Bring Apple Security Approach Under Scrutiny

Researchers find exploit for previously known vulnerability and create firmware worm that can spread without physical network

9 years ago

Yahoo Ad Network Spreads Malware – Again

The latest malicious ad campaign follows an incident that affected Yahoo and AOL last year

9 years ago

Microsoft Tests Quantum Computer-Proof Web Encryption

New system may allow the web's SSL systems to fend off attacks by advanced quantum computers

9 years ago