security

Flight Delayed Over Galaxy Note 7 HoaxFlight Delayed Over Galaxy Note 7 Hoax

Flight Delayed Over Galaxy Note 7 Hoax

A Virgin Atlantic flight was delayed and almost diverted after a passenger changed their Wi-Fi hotspot name to 'Galaxy Note…

8 years ago
Security Vulnerabilities Found In Airline Entertainment SystemsSecurity Vulnerabilities Found In Airline Entertainment Systems

Security Vulnerabilities Found In Airline Entertainment Systems

IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access

8 years ago
Password Reuse Strikes Again As Fraudsters Hit Groupon UsersPassword Reuse Strikes Again As Fraudsters Hit Groupon Users

Password Reuse Strikes Again As Fraudsters Hit Groupon Users

One user has claimed their account was used to purchase a £2,400 European holiday

8 years ago
Security Hole Could Let Hackers Take Control Of PlanesSecurity Hole Could Let Hackers Take Control Of Planes

Security Hole Could Let Hackers Take Control Of Planes

Security researchers was able to "hijack" in-flight displays and control cabin lighting

8 years ago
Facebook Under Fire From EU Antitrust Probe Over Data Sharing With WhatsAppFacebook Under Fire From EU Antitrust Probe Over Data Sharing With WhatsApp

Facebook Under Fire From EU Antitrust Probe Over Data Sharing With WhatsApp

The social networking company has been accused of misleading the EU during its acquisition of WhatsApp

8 years ago
IBM Security Reveals 70 Percent Of Businesses Pay Up To RansomwareIBM Security Reveals 70 Percent Of Businesses Pay Up To Ransomware

IBM Security Reveals 70 Percent Of Businesses Pay Up To Ransomware

A quarter of business executives would be willing to pay up to $50,000 (£40,000) to get their data back

8 years ago
MPs Urge GCHQ Action On Bank Cyber-CrimeMPs Urge GCHQ Action On Bank Cyber-Crime

MPs Urge GCHQ Action On Bank Cyber-Crime

Financial regulators need their own cyber-security apparatus that isn't dependent upon GCHQ, argues the head of the Treasury Committee

8 years ago
Faketoken Mobile Banking Trojan Targets 2,000 Android AppsFaketoken Mobile Banking Trojan Targets 2,000 Android Apps

Faketoken Mobile Banking Trojan Targets 2,000 Android Apps

The data encryption capability is unlike that of most mobile ransomware in that it blocks the data rather than the…

8 years ago
Akamai Buys Startup CyberFend To Battle Bots In The Cloud And OnlineAkamai Buys Startup CyberFend To Battle Bots In The Cloud And Online

Akamai Buys Startup CyberFend To Battle Bots In The Cloud And Online

Bot hunting tech will be added to Akamai's existing online security software

8 years ago
LinkedIn’s Lynda.com Suffers Data Breach, 9.5 Million Users Alerted To The HackLinkedIn’s Lynda.com Suffers Data Breach, 9.5 Million Users Alerted To The Hack

LinkedIn’s Lynda.com Suffers Data Breach, 9.5 Million Users Alerted To The Hack

55,000 users have had their passwords reset after someone gained access to a database containing user information

8 years ago
Ashley Madison Parent Company Slapped With £1.3m Fine Over Data BreachAshley Madison Parent Company Slapped With £1.3m Fine Over Data Breach

Ashley Madison Parent Company Slapped With £1.3m Fine Over Data Breach

The adultery site's parent company is to pay the FTC $1.6m for deceptive marketing practices and the lack of basic…

8 years ago
ENISA: Encryption Back-Doors ‘Not A Solution’ENISA: Encryption Back-Doors ‘Not A Solution’

ENISA: Encryption Back-Doors ‘Not A Solution’

EU security body concludes government-mandated backdoors would make legitimate services less secure and harm law enforcement

8 years ago
BAE Systems Boosts UK Security With Extended CyLon PartnershipBAE Systems Boosts UK Security With Extended CyLon Partnership

BAE Systems Boosts UK Security With Extended CyLon Partnership

BAE Systems commits financial investment and expert support for UK's cyber security startups

8 years ago
Money, Data And Disruption: Cyber Attacks Of 2016Money, Data And Disruption: Cyber Attacks Of 2016

Money, Data And Disruption: Cyber Attacks Of 2016

2016 has been an interesting year for cyber security, and that's putting it mildly

8 years ago

Yahoo Suffers Biggest Data Breach In History With A Billion Accounts Hacked

Another major data breach could torpedo Yahoo’s acquisition by Verizon

8 years ago

Microsoft Ends 2016 With Patch Tuesday Windows 10 Fix

Internet connection issues for Windows 10 users resolved in last Patch Tuesday update of 2016

8 years ago

Windows And Android Malvertising Campaign Puts Home Routers Under Attack

Security researchers at Proofpoint have identified a new malvertising attack on internet routers which ensnares networks though legitimate websites.

8 years ago

IBM Opens Watson Experience Center In San Francisco

Five years after Watson made its international splash by unseating the "Jeopardy" television quiz show's human champion Ken Jennings, it's…

8 years ago

High-Profile Mobile Websites And Apps Caught Leaking Sensitive Data

More than 200 mobile websites and apps, including the Royal Mail and Deezer, have been caught exposing sensitive consumer and…

8 years ago

EU To Tighten User Data Rules For Skype & WhatsApp

Internet-based companies face stricter data security rules under draft changes that mirror upcoming data protection laws

8 years ago

SWIFT Discloses More Successful Bank Heists

Attacks have continued since the Bangladesh heist, with one-fifth resulting in fraud

8 years ago

MobileIron CEO: Windows 10 Lets Us Manage PCs Like Mobiles

INTERVIEW: MobileIron CEO Barry Mainz tells Silicon about PC management, the rise of IoT and why it is better equipped…

8 years ago

Apple iOS 10.2 Brings More Emojis And Boosts iPhone Security

Apple's latest version of iOS 10 also brings with it a host of word replacing emojis

8 years ago

Apple Tackles iCloud Calendar Spam With Report Button

The button will alert Apple to spam trying to sneak passed its email filters via the calendar service

8 years ago

Ransomware Offers Incentives To Infect Others With Malware

The malware offers a free decryption key if the victim forces to others to pay up

8 years ago

Obama Orders Full Review Of Russia Election ‘Hacking’

The review is to examine government-sponsored hacks going back to 2008

8 years ago

Firmware Flaw Leaves Netgear Routers Vulnerable To Hacker Takover

Hackers can exploit a command injection flaw to execute malicious code on Netgear routers

8 years ago