DDoS attacks are getting less powerful but lasting longer - apart from increasingly frequent mega attacks capable of taking out ISP routers
News secure-it
The New Cyberattacks Threatening Public Sector Companies
Targeted attacks on public utilities and governments are intensifying, Trend Micro report finds
Darkode Suspect Pleads Guilty Of Selling Botnet Access
A New York man arrested in the raids on Darkode hackers last month admitted to selling access to systems compromised via Facebook malware
Advanced Persistent Threats Going Unnoticed By Website Owners
Websites are failing to cope with Advanced Persistent Threats (APTs), despite many of them not being advanced at all, says High-Tech Bridge's CEO, Ilia Kolochenko
Google Fixes Broken Stagefright Patch
Google acknowledged a flaw in its first patch for the Stagefright issue, which affects nearly 1 billion Android devices
Kaspersky Denies ‘False Positive’ Campaign Against Rivals
Kaspersky Lab has denied a report that it manipulated antivirus data to harm competitors including Microsoft, Avast and AVG
How To Overcome Digital Forensic Challenges In The Cloud
Professor Hamid Jahankhani, head of doctoral Studies at GSM London, gets all CSI in the cloud environment
Julian Assange Assault Probe Dropped, As UK Protests
Investigation into sexual assault claims against Julian Assange have been dropped, but the rape accusation still stands
Dropbox Bulks Up Chrome Security With USB Two Factor Authentication
Dropbox now supports USB U2F two factor authentication to protect users from phishing during the login process
Patch Tuesday Tackles Windows 10 Fixes
Microsoft welcomes its newest operating system, Windows 10, to its Patch Tuesday update cycle
The Smart City Vs The Safe City
Tony Burton, director of Protection Systems at Thales UK, discusses how smart and safe cities have challenges ahead in the road to security
How To Explain A Trojan Horse To A Five-year-old
The definitive definition of a Trojan Horse from the experts for the kids (and grown ups, too)
Memory ‘Sinkhole’ Lets Attackers Take Control Of Intel Chips
A hardware flaw detailed at Black Hat allows attackers to take control of Intel chips' most privileged mode
Researchers Detail ‘Severe’ Mobile Fingerprint Flaws
Attackers can hijack fingerprint-protected transactions and harvest fingerprints from mobile devices, according to FireEye
Facebook ‘Loophole’ Allows Personal Data Harvesting
Facebook dismissed claims that the technique could be used to build massive scam databases
Internet Security ‘Undermined By Random Number Weaknesses’
The random numbers used by web cryptographic systems aren't random enough, say security researchers
‘Certifi-Gate’ Security Flaw Hits Millions Of Android Devices
Smartphones from LG, Samsung, HTC and ZTE could all be at risk, Check Point team warn
Watch Out: That Windows 10 Update Might Be Ransomware
Bitdefender study reveals criminals are sending out Windows 10 upgrade emails to disguise CTB Locker ransomware
How To Configure Windows 10 Privacy Like A Pro
Bitdefender’s Catalin Cosoi share his tips on how to set up Windows 10 to ensure you stay safe online
Android Fingerprint Readers Are Also A Security Risk
It’s not just TouchID that’s at risk from hackers looking for personal data, Black Hat researchers find
Texas Drone Uncovers Scale Of IoT Security Worries
Austin-based drone discovers details of 1,600 IoT devices in just a few neighbourhoods
Samsung, Google Nexus Devices To Get Monthly Android Security Updates
Smartphones and tablets will be among the first to benefit from incremental updates to Android
Beware – Your Smart Home Might Be A Massive Security Risk
Tripwire survey finds zero-day vulnerabilities in many of the leading smart home hubs
FBI Called In To Investigate Hillary Clinton Email Set-Up
FBI agents are looking into the security of the presidential hopeful’s private account
Why Google Has Yet To Fix Chromecast Flaw One Year Later
NEWS ANALYSIS: Not all public exploits get patches—and sometimes there are even good reasons why. That's the case with a flaw in Chromecast that was demonstrated at last year's Black Hat security conference
BIND Flaw Opens Door To Hacker Attacks On DNS
Patch now! BIND flaw is being exploited by hackers and websites can be taken offline, researchers warn
Employees Just Don’t Care About Keeping Company Data Safe With BYOD
Kaspersky survey finds only one in ten workers bothering to keep work files safe from cyber attack
Two Major Mac OS X Vulnerabilities Bring Apple Security Approach Under Scrutiny
Researchers find exploit for previously known vulnerability and create firmware worm that can spread without physical network
Yahoo Ad Network Spreads Malware – Again
The latest malicious ad campaign follows an incident that affected Yahoo and AOL last year
Microsoft Tests Quantum Computer-Proof Web Encryption
New system may allow the web's SSL systems to fend off attacks by advanced quantum computers