security

‘Hundreds’ Of Websites Track User Keystrokes

Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality

7 years ago

Security Panel: What On Earth Was Uber Thinking?

Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?

7 years ago

US Government Warns Businesses Over Intel Management Engine Flaw

Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors

7 years ago

Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen

New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…

7 years ago

New £5m Institute Opens In Northern Ireland To Investigate Hardware Security

Queens University Belfast to host £5m institute that looks to make hardware more secure in era of IoT

7 years ago

Interpol & Cisco To Combat Cyber Crime At Singapore Nerve Centre

Cisco is to contribute its world-spanning cyber-threat analysis to help battle increasingly sophisticated internet threats

7 years ago

Five Steps To Keep North Korean Hackers Out Of Your Network

ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…

7 years ago

AWS ‘Secret Region’ Serves US Government Customers

AWS re:Invent 2017: New government-focused region complements an existing deal that gives US intelligence agencies access to air-gapped cloud infrastructure

7 years ago

CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates

CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software

7 years ago

BankBot Malware Slips Into Google Play Yet Again

The banking Trojan, which imitates real banking apps to steal users' login details, has been reported on Google Play several…

7 years ago

Harvard University Recommends How To Stop Election Hackers

The new Harvard programme is intended to put local and national election campaigns on guard against nation state hacking attacks

7 years ago

Silicon Readers Say Android Is The Dominant Mobile OS In The Workplace

Android is used by almost half of our readers at work and some people out there still use BlackBerry

7 years ago

IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security

At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…

7 years ago

GitHub Notifies Developers If Their Software Project Has A Security Issue

GitHub says move is an important step for open source security

7 years ago

IBM Quad9 DNS Service Offers Rogue Site Protection

Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection

7 years ago

North Korea Getting Ready Wage A Global Cyber War, Experts Say

ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…

7 years ago

Cash Converters Admits Data Breach After Website Hack

Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters

7 years ago

Debate: Should We Be Concerned About IoT Security Or Not?

The consensus is that IoT is a security threat. But should we really be concerned?

7 years ago

Trump Clarifies US Government Rules For Cyber Security Flaw Disclosures

New rules governing how US agencies disclose cyber security flaws, as the FCC readies net neutrality reversal

7 years ago

Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack

Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…

7 years ago

MIT Helping To Define New Model To Restore Trust In Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…

7 years ago

ESET Detects More Malicious Apps On Google Play

Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan

7 years ago

Patch Tuesday: Microsoft’s 53 Vulnerabilities Surpassed By Adobe Fixes

No zero-day vulnerabilities this month, but still a moderate number of patches from Microsoft

7 years ago

Governments Accused Of Social Media Manipulation

Grim picture...social media is being manipulated, mobile connectivity is being censored, and attacks against journalists is on the rise

7 years ago

IBM X-Force Discovers IcedID Banking Trojan

New banking Trojan discovered and is active in the wild hitting targets in the United States and the UK

7 years ago

AWS Sells Chinese Cloud Assets Amid Tightening Regulations

Amazon admits sale will help AWS comply with local regulations introduced earlier this year

7 years ago

Apple iPhone X Face ID ‘Is Tricked’ By 3D Printed Mask

Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure

7 years ago

Huddle Flaw Exposes Sensitive Corporate Data

Confidential KPMG documents accessed because of security flaw with sign in process

7 years ago

AWS Beefs Up Security Features After S3 Misconfigurations

No more leaky S3 buckets? Amazon adds encryption and admin dashboard for better security control

7 years ago

Tech Quiz: Australia & Technology

What do you know about technology down under?

7 years ago