Hackers breach Outbrain feeds to spread their message across major media websites
Tibetans are pummelled with cyber attacks, but the security industry is not helping, and may even be hindering, TechWeek hears
Hackers may now seek to exploit the flaw, despite a Microsoft workaround
Big Blue planning a new security research lab in Tel-Aviv too
North's 200 trolls using stolen credentials to post propaganda on South Korean websites, think tank claims
Thousands of sites compromised to serve up the Blackhole exploit kit, Verasafe says, as Joomla users urged to update
GCHQ looks to come to the aid of businesses beleaguered by cyber attacks
Bugs previously rewarded at the $1,000 level will now be considered for reward at up to $5,000, Google says
Tibetans targeted yet again in watering hole attack
Verizon Business, Level 3, Viatel and Interoute also asked to open up on alleged GCHQ collaboration
Lavabit says it did not want “to become complicit in crimes against the American people”, whilst Silent Circle says it…
Researchers surprised by high price of Linux Trojan selling for $2,000 on Russian underground forums
Cyber crooks targeting and then using CMSs like WordPress, Joomla and Drupal to spread nastiness
Fake nuclear bomb story posted on Snow's blog, as Channel 4 blogs remain down
Tim Berners-Lee disappointed by Google's response to criticism of Chrome's stored passwords
Twitter dumps SMS form of two-factor for significantly more secure method
Zimbabweans knocked offline and see data wiped because of slew of cyber attacks last week during the elections, TechWeekEurope learns
Lloyds Banking Group gets in trouble for sending faxes containing customer data to the wrong people
Criminals, or possible vigilantes, are delivering illegal images and malicious software in one go
Wikimedia Foundation says it appears to have been “specifically targeted by XKeyscore” NSA surveillance tool
Russian mobile malware factories working with thousands of affiliates to exploit Android users
US made 902 of 1,157 requests in the first half of this year
"Jekyll" exploit can introduce malicious functionality after Apple checks, whilst bespoke chargers can install malware on iPhones
Alexander fends off attacks from BlackHat audience member
A slide leaked by Snowden reads: "Show me all the VPN startups in country X, and give me the data…
Firefox maker announces two open source security projects, one a fuzzing tool, the other a security testing platform