security

NHS Hit By ‘Dozens’ Of Ransomware Attacks

At least 28 NHS trusts in England have been affected by ransomware in the past year, researchers find

8 years ago

Persistent Warnings Are Causing ‘Security Fatigue’

People are becoming weary of constant security advice and businesses could pay the price for poor decisions, a report has…

8 years ago

Spotify: Malware Pop-ups Affected ‘Small Numbers’

Music service fixes the problem that displayed virus laden websites for “small numbers of users”

8 years ago

Cross Channel: Work In IT? Maybe It’s Time To Move North

All the latest from the world of the IT channel. This week: The north-south wage gap in IT is spending…

8 years ago

IP Expo 2016: Microsoft CTO, Google And IBM Debate The Future Of Cloud

IP EXPO 2016: Microsoft Azure CTO Mark Russinovich and others discuss the future of cloud and whether security is still…

8 years ago

With Pixel Google Aims to Exert Greater Control Over Phone Support

ANALYSIS: Google's latest effort to produce an Android smartphone to compete with the Apple iPhone looks promising. But will it…

8 years ago

Signal Disclosed User Data To US Government

Signal's parent company provided data on a user to US authorities - but there wasn't much to hand over

8 years ago

TalkTalk’s Cyber Security Negligence Gets It Hit With £400,000 ICO Fine

The Information Commissioner said TalkTalk’s security was found wanting

8 years ago

Linux ‘Vulnerable To Tweet-Sized Attack’

The short command could allow any user to crash most Linux systems, claims a developer

8 years ago

Turkey, Italy And Hungary Riddled With Botnets Finds Norton Research

Botnets hop on high-speed city infrastructure to fire malware, spam and other threats across the Internet

8 years ago

DressCode Malware Infects Hundreds Of Google Play Apps

The malware could allow hackers to bypass corporate firewalls, according to Trend Micro

8 years ago

Shellshock Bug Back And Stronger Than Ever

IBM Managed Security Services identifies poor server patching as the reason for the bug's survival

8 years ago

Federal Agencies Working With States to Guard Voter Data Security

Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in…

8 years ago

Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks

ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security…

8 years ago

TalkTalk ‘Unambiguously’ Reprises Role As Broadband Underdog

TalkTalk hopes clearer pricing and better deals will help keep customers after cyber attack fallout

8 years ago

Hacker Releases IoT Botnet Source Code

The 'Mirai' family of botnets hijacks Internet-connected devices and uses them to launch large-scale attacks

8 years ago

UK’s National Cyber Security Centre Open Doors To Defend Britain From Hackers

The National Cyber Security Centre will focus on boosting the UK's cyber defense rather than offensive capabilities

8 years ago

Cross Channel: Avast & AVG Become One And Falling Fortunes For Capita

All the latest news from the world of the channel, including Avast’s purchase of AVG

8 years ago

Energy Sector Is A ‘Prime Target’ For Cyber Attacks

Cyber attacks against energy companies have risen massively, with the industry a prime target for attackers

8 years ago

BlackBerry’s Smartphone Exit Will Mean Little To Most

ANALYSIS: BlackBerry's smartphone fall from grace is the end of an era but software-focused company has a chance despite previous…

8 years ago

Brexit: ICO Says GDPR Will Come Into Effect Before Britain Leaves The EU

UK companies will likely need to work with in GDPR regardless of the Brexit

8 years ago

Yahoo Hack: Eastern European Blackhats Responsible For The Massive Data Breach

Cyber security firm InfoArmor says criminal hackers for hire are to blame for the Yahoo hack in 2014

8 years ago

Qualcomm Snapdragon 600E And 410E Chips Target The IoT

The chips will be distributed as stand alone SoCs for the first-tine

8 years ago

Apple Harvests iMessage Logs And Could Share Them With The Police

Questions are raised over how private Apple's services really are.

8 years ago

BlackBerry Stops Making Smartphones

BlackBerry calls time on its fading device business will stop making its own smartphones, licensing its brand to third parties.

8 years ago

Dropbox Receives Privacy Shield Certification For EU-US Data Transfers

Dropbox says it is protecting the privacy of its customers but is Privacy Shield better than Binding Corporate Rules?

8 years ago

Yahoo Certificate Security Is ‘Still Poor’ Despite Hack

Research finds that Yahoo has still not taken steps to improve its certificate security and encryption, despite massive data breach

8 years ago

MarsJoke Ransomware Targets US Government And Education Institutions

Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims

8 years ago

Apple iOS 10 Flaw Makes It Easier To Hack iPhone Backups

Researchers uncover “major security flaw” in Apple's iOS 10 backup protection for iTunes as iOS 10.0.2 fixes unrelated headphone issue

8 years ago

The Challenges Of Deploying Box In Local Government

Boxworks 2016: How can local government authorities make the most of Box without disrupting services and protecting citizens data?

8 years ago