secure-it

Washington Post, CNN And Others Hit By Syrian Electronic Army

Hackers breach Outbrain feeds to spread their message across major media websites

11 years ago

Tibetans Under Cyber Attack – And The Security Industry Isn’t Helping

Tibetans are pummelled with cyber attacks, but the security industry is not helping, and may even be hindering, TechWeek hears

11 years ago

Microsoft Pulls Critical Exchange Patch

Hackers may now seek to exploit the flaw, despite a Microsoft workaround

11 years ago

Google Offers Fixes For Android Flaws Used To Steal Bitcoins

Google admits to flaws and sends out update code to manufacturers, but no timeline on when users will see the…

11 years ago

IBM To Acquire Israeli Fraud Detection Firm Trusteer

Big Blue planning a new security research lab in Tel-Aviv too

11 years ago

Crooks Use Google’s Own Cloud To Control Android Malware

Google's cloud is abused as part of attackers' command and control infrastructure

11 years ago

North Korea ‘Uses Troll Army For Attacks On South’

North's 200 trolls using stolen credentials to post propaganda on South Korean websites, think tank claims

11 years ago

Simple Joomla Hacks ‘Hit Thousands Of Websites’

Thousands of sites compromised to serve up the Blackhole exploit kit, Verasafe says, as Joomla users urged to update

11 years ago

GCHQ Unveils Cyber Attack Response Schemes

GCHQ looks to come to the aid of businesses beleaguered by cyber attacks

11 years ago

Google Announces Big Increase For Bug Bounty Rewards

Bugs previously rewarded at the $1,000 level will now be considered for reward at up to $5,000, Google says

11 years ago

Tibetans Targeted As Dalai Lama Site Hacked To Serve Malware

Tibetans targeted yet again in watering hole attack

11 years ago

BT, Vodafone Threatened With Legal Action Over ‘GCHQ Collusion’

Verizon Business, Level 3, Viatel and Interoute also asked to open up on alleged GCHQ collaboration

11 years ago

Lavabit And Silent Circle Shut Down Email Services Over US Surveillance Fears

Lavabit says it did not want “to become complicit in crimes against the American people”, whilst Silent Circle says it…

11 years ago

‘Hand Of Thief’ Trojan Targets Linux Users’ Bank Accounts

Researchers surprised by high price of Linux Trojan selling for $2,000 on Russian underground forums

11 years ago

Large Botnets Attack WordPress And Joomla

Cyber crooks targeting and then using CMSs like WordPress, Joomla and Drupal to spread nastiness

11 years ago

Syrian Electronic Army Hacks Blog Of Channel 4 Presenter Jon Snow

Fake nuclear bomb story posted on Snow's blog, as Channel 4 blogs remain down

11 years ago

Google Slammed Over ‘Insane’ Chrome Password Exposure

Tim Berners-Lee disappointed by Google's response to criticism of Chrome's stored passwords

11 years ago

Twitter Boosts Two-Factor Authentication After Criticism

Twitter dumps SMS form of two-factor for significantly more secure method

11 years ago

Cyber Attacks Strike Zimbabweans Around Controversial Election

Zimbabweans knocked offline and see data wiped because of slew of cyber attacks last week during the elections, TechWeekEurope learns

11 years ago

Microsoft Warns Of Windows Phone Password Snooping Danger

Windows Phones could leak corporate network passwords, Microsoft warns

11 years ago

Lloyds Bank Of Scotland Fined £75k Over Faxing Blunders

Lloyds Banking Group gets in trouble for sending faxes containing customer data to the wrong people

11 years ago

Google Launches Android Device Manager

Google has launched its version of Find My iPhone for Android

11 years ago

Websites Hacked To Serve Up Child Abuse Images And Malware

Criminals, or possible vigilantes, are delivering illegal images and malicious software in one go

11 years ago

Wikipedia Crew Plotting Anti-NSA Snooping Security Boost

Wikimedia Foundation says it appears to have been “specifically targeted by XKeyscore” NSA surveillance tool

11 years ago

DEF CON: 30 Percent Of Mobile Malware Made By 10 Russian Firms

Russian mobile malware factories working with thousands of affiliates to exploit Android users

11 years ago

BlackHat: Researchers Sneak Malware Past iOS Security Protections

"Jekyll" exploit can introduce malicious functionality after Apple checks, whilst bespoke chargers can install malware on iPhones

11 years ago

NSA Chief Heckled At BlackHat As Agency Defends XKeyscore

Alexander fends off attacks from BlackHat audience member

11 years ago

NSA XKeyscore Tool ‘Could Crack VPNs And Expose The Anonymous’

A slide leaked by Snowden reads: "Show me all the VPN startups in country X, and give me the data…

11 years ago

Mozilla And BlackBerry Collaborating On Bug Squishing Tech

Firefox maker announces two open source security projects, one a fuzzing tool, the other a security testing platform

11 years ago