security

Election 2017: Labour Gives UK Tech Brexit Assurances & Ultrafast Broadband Pledge

Labour would seek to ensure UK tech firms have access to talents and market, while it would also work to…

8 years ago

Cisco Threat Defense Service Looks To Secure IoT Devices

Security platform focuses on segmenting connected devices to help defend against growing IoT cyber threats

8 years ago

Netgear Routers Now Collecting Data On Users’ Networks

Users must opt out of the data collection, which includes the IP and MAC addresses of devices connected to the…

8 years ago

ENISA Position Paper Pushes ‘Trust Label’ For IoT Devices

ENISA is pushing forward with a proposed scheme that would mandate a basic level of security for all Internet-connected devices

8 years ago

Android Malware Used To Rob Russian Bank Customers

The Cron hacking gang used malicious apps and software to infect a million Android smartphones

8 years ago

Election 2017: Conservatives Make ‘Fast Changing Tech’ And Security Key Priorities

GE2017: Tories want the UK to be the best place to start a digital business and promise to make the…

8 years ago

BT Branded Email Scam Aims To Exploit WannaCry Ransomware Fears

The phishing scam is piggy-backing onto WannaCry warnings

8 years ago

Zomato, DocuSign Breaches Reveal Common Security Risks

ANALYSIS: WannaCry ransomware worm outbreak isn't the only cybersecurity incident that users need to worry about, as a pair of…

8 years ago

North Korea’s Unit 180 Hacking Cell Accused Of Major Cyber Attacks

Major hack attacks appear to be a money making exercise for North Korea's regime

8 years ago

LastPass Can Now Store Two-Factor Authentication Keys In The Cloud

The company argues there's no additional security risk to doing so, as long as they have 2FA turned on for…

8 years ago

EternalRocks Worm Exploits 7 NSA Hacking Tools

Cyber security researchers have identified a potential WannaCry successor

8 years ago

Researchers Release WannaCry Decryption Tool

Users may be able to recover files without paying a ransom using a tool that searches a system's memory to…

8 years ago

HSBC Voice Recognition ID System Tricked By Twins

Biometric security may not be a secure as its made out to be

8 years ago

Botnets Target FCC Website Over Net Neutrality, Researchers Say

Researchers claim bots are spamming US regulator website over net neutrality rule change proposal

8 years ago

UEFA CIO: How To Build Pan-Continental Infrastructure For Euro 2020

INTERVIEW: UEFA head of ICT Daniel Marion talks about providing the infrastructure to support European football and plans for Euro…

8 years ago

DocuSign Suffers Data Breach, Customers Targeted With Phishing Emails

DocuSign has warned users to immediately delete any unexpected communications

8 years ago

Apple Fixes Dozens Of Serious MacOS, iOS Flaws

The patches for iOS, macOS and other software include fixes for a bug that could allow a malicioud ebook to…

8 years ago

WannaCry Malware Outbreak ‘Linked To North Korea’ Claim Google Security Researchers, Kaspersky And Symantec

Code similarities indicate WannaCry ransomware may have been developed by North Korea-linked Lazarus Group

8 years ago

Trump’s Cyber Security Executive Order Is A Good First Step

Executive Order includes efforts to modernise IT systems and protect critical infrastructure

8 years ago

Microsoft President Slams NSA, Calls For Unity Following ‘WannaCrypt’ Ransomware Attacks

Fallout from WannaCrypt attacks continues as Microsoft publicly calls out NSA for stockpiling security vulnerabilities

8 years ago

NHS Ransomware Attack Needs To Be A Wake Up Call For Government IT

OPINION: Legacy systems leave critical public infrastructure vulnerable to the dark side of the Internet

8 years ago

Dell EMC World 2017: Why There’s No Stopping The Dell Technologies Juggernaut

IN DEPTH: Dell EMC World 2017 is over, but this is just the beginning for the Michael Dell-led conglomerate

8 years ago

Eugene Kaspersky Rejects Russian Government Links, Champions Cybersecurity Skills

Eugene Kaspersky also sees AI as having a role in cyber security, though human level intelligence is a way off

8 years ago

Tales In Tech History: The Y2K Bug

Computing armageddon was forecast in the lead up to the new century, yet for many the Y2K Millennium bug was…

8 years ago

Yahoo’s Lack Of Cooperation Is Slammed By German Cyber Agency

BSI chief recommends German users consider switch switching to other email providers

8 years ago

Tech Quiz: The Week In Review (12 May)

It's been a week filled with tech news, but have you been paying attention?

8 years ago