security

DressCode Malware Infects Hundreds Of Google Play Apps

The malware could allow hackers to bypass corporate firewalls, according to Trend Micro

8 years ago

Shellshock Bug Back And Stronger Than Ever

IBM Managed Security Services identifies poor server patching as the reason for the bug's survival

8 years ago

Federal Agencies Working With States to Guard Voter Data Security

Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in…

8 years ago

Weak Device Security Turns IoT Into Powerful Weapon In DDoS Attacks

ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security…

8 years ago

TalkTalk ‘Unambiguously’ Reprises Role As Broadband Underdog

TalkTalk hopes clearer pricing and better deals will help keep customers after cyber attack fallout

8 years ago

Hacker Releases IoT Botnet Source Code

The 'Mirai' family of botnets hijacks Internet-connected devices and uses them to launch large-scale attacks

8 years ago

UK’s National Cyber Security Centre Open Doors To Defend Britain From Hackers

The National Cyber Security Centre will focus on boosting the UK's cyber defense rather than offensive capabilities

8 years ago

Cross Channel: Avast & AVG Become One And Falling Fortunes For Capita

All the latest news from the world of the channel, including Avast’s purchase of AVG

8 years ago

Energy Sector Is A ‘Prime Target’ For Cyber Attacks

Cyber attacks against energy companies have risen massively, with the industry a prime target for attackers

8 years ago

BlackBerry’s Smartphone Exit Will Mean Little To Most

ANALYSIS: BlackBerry's smartphone fall from grace is the end of an era but software-focused company has a chance despite previous…

8 years ago

Brexit: ICO Says GDPR Will Come Into Effect Before Britain Leaves The EU

UK companies will likely need to work with in GDPR regardless of the Brexit

8 years ago

Yahoo Hack: Eastern European Blackhats Responsible For The Massive Data Breach

Cyber security firm InfoArmor says criminal hackers for hire are to blame for the Yahoo hack in 2014

8 years ago

Qualcomm Snapdragon 600E And 410E Chips Target The IoT

The chips will be distributed as stand alone SoCs for the first-tine

8 years ago

Apple Harvests iMessage Logs And Could Share Them With The Police

Questions are raised over how private Apple's services really are.

8 years ago

BlackBerry Stops Making Smartphones

BlackBerry calls time on its fading device business will stop making its own smartphones, licensing its brand to third parties.

8 years ago

Dropbox Receives Privacy Shield Certification For EU-US Data Transfers

Dropbox says it is protecting the privacy of its customers but is Privacy Shield better than Binding Corporate Rules?

8 years ago

Yahoo Certificate Security Is ‘Still Poor’ Despite Hack

Research finds that Yahoo has still not taken steps to improve its certificate security and encryption, despite massive data breach

8 years ago

MarsJoke Ransomware Targets US Government And Education Institutions

Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims

8 years ago

Apple iOS 10 Flaw Makes It Easier To Hack iPhone Backups

Researchers uncover “major security flaw” in Apple's iOS 10 backup protection for iTunes as iOS 10.0.2 fixes unrelated headphone issue

8 years ago

The Challenges Of Deploying Box In Local Government

Boxworks 2016: How can local government authorities make the most of Box without disrupting services and protecting citizens data?

8 years ago

DDoS Attacks Heading Toward 1-Terabit Record

ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not…

8 years ago

Snooping Becomes Legal In Switzerland To Combat Terrorism

Swiss voters have approved a law that allows security services to conduct surveillance operations

8 years ago

Yahoo, LinkedIn, Apple iCloud: 10 Big Data Breaches

Data breaches from hack attacks continue to get bigger and bolder but which of these do you remember?

8 years ago

What Should You Do After Massive Yahoo Hack?

ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next

8 years ago

Sky And BT Email Users Are Caught Up In Yahoo Password Hack

Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach

8 years ago

GCHQ And DCMS Join Forces With Cyber Security Startups

The new Accelerator centre will help startups develop cyber security systems with the help of £50 million of government funding

8 years ago

Twitter Data Will Be Used To Tackle LA Hate Crime

An $800,000 grant has been awarded to the University to create a social network powered hate speech detecting system

8 years ago

Latest iOS 10 Security Features Help Apple’s Business Case

ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according…

8 years ago

Hackers Are Using Consumer IoT Devices To Launch DDoS Attacks

Lax IoT security is allowing cyber criminals to syphon bandwidth to launch attacks on big businesses

8 years ago

Hack Attacks On Satellites Pose ‘Catastrophic’ Risk To The World

Chatham House researchers warn space assets are ripe targets for cyber criminals, hackers and terrorists

8 years ago