How much do you know about the biggest threats online?
News secure-it
Anthem Admits Data Breach After ‘Sophisticated’ Attack
US healthcare insurer admits 80 million customer and staff records compromised in a damaging cyber attack
Toshiba Releases Encrypted USB Stick With Built-In Keypad
10-number keypad used to authenticate access to documents inside
Creator Of Online Black Market Silk Road Faces Life Behind Bars After Guilty Verdict
Ross Ulbricht AKA Dread Pirate Roberts was found guilty of seven federal charges, including drug trafficking and money laundering
NSA Reform Proposals Slammed As ‘Pitiful’
New proposals governing NSA data collection don't go far enough, campaigners complain
Google – We Blocked 524 MILLION Bad Ads Last Year
Search giant also banned 214,000 advertisers and removed 250,000 sites in fight against malware
Prison Sentence Looms For Revenge Porn Owner
The owner of a 'revenge porn' website has been convicted of numerous charges in the United States
Three Apps Pulled From Google Play After Infecting Millions Of Devices With Adware
More than 10 million devices have been infected by the malware, which tries to con users into needlessly spending money
Good For Samsung Knox Aims To Secure Android For Businesses
Good Technology and Samsung continue collaboration with Android integration
MobileIron Wants To Lock Down Work Data On Your Personal Cloud
Firm's shadow IT buster 'Content Security Service' will aim to secure work content even with BYOD workers
Insecure Browsers Causing Spike In Malware Damage
The cost to respond to and remediate one security breach resulting from failed malware detection technology is approximately $62,000 per breach
US Military Recruits Gamers To Fly Killer Drones
Former gamers speak of carrying out thousands of killings through the CIA's Predator drone programme
User Data Compromised In Gamer Social Network Hack
User Data Compromised In Raptr Gamer Social Network Hack
Third Time Unlucky: Adobe Forced To Release Hatrick Of Unscheduled Security Patches
Adobe's latest flaw has allowed hackers to take control of thousands of users' computers
Google To Pay Up-Front For Security Research
Google is supplementing its existing bug bounty programmes with a scheme that will pay top researchers to investigate key services
Couples Beware – Could Your Sex Toys Be Spying On You?
Talk about a ruined Valentines Day - hacked sex toys can be accessed to post images and even video
Governments Have No Idea How To Stop Cyberterrorists – Time To Call In John McClane, Says Eugene Kaspersky
Seen Die Hard 4.0? That’s what’s coming soon if you don’t shape up, Kaspersky warns world leaders
BMW Patches Car Hack Vulnerability
German carmaker patches flaw that could allow hackers to gain access to BMW, Mini, and Rolls Royce vehicles
The Critic’s View: Data Privacy Day / Data Protection Day
Our round-up of the expert views concerning keeping your data safe online
Google To Change Privacy Policy, ICO Confirms
Google agrees to alter its UK privacy policy after escaping a fine by Information Commissioner
DDoS Attack Volume On The Rise
Arbor's 10th Annual Worldwide Infrastructure Security Report points to the growing attack bandwidth and application layer attacks
Russian Dating Website Buys Back 20 million Stolen Email Addresses
Details remain sketchy - has the hacker turned security consultant?
CyLon To Help Startups Develop UK’s Cyber Defences
The scheme aims to develop the UK into Europe's hub for cyber security startups
LocalBitcoins Hack Proves Bitcoin Wallets Need Two-Factor Authentication
A new type of malware has been blamed for the bitcoin theft
China Demands Technology Firms Hand Over Source Code
Protectionism or national security? China demands foreign firms hand over source code for inspection
7 Ways To Increase Your Privacy By Customising Firefox
Johnathan Nightingale, VP Firefox at Mozilla, explains how you can safeguard your privacy on computers and mobile devices
How To Overcome The ‘Tech Deficit’ And Meet Your Data Centre Security Needs
Colt's John Hayday discusses security needs in today's data centre
US Military Develops Invisible Biometric ‘Passwords’
The end of traditional biometric and password security? US Military signs deal for new ID verification system
Severe Linux GHOST Flaw Spooks Out Computer Users
Critical vulnerability found in Linux systems gives attackers control without system credentials
Could Your Apps Be Putting Your Smartphone At Risk?
Smartphone users need to be aware of what data their mobile apps have access to, say Silent Circle and Blackphone