security

Government Plans ‘Active’ Cyber Security Approach

Government plans to show more cyber-security initiative, says head of new National Cyber Security Centre, as NAO describes cabinet IT…

8 years ago

Russian Hackers Release US Athletes’ Doping Data

Anti-doping officials confirm hackers accessed sensitive medical records related to Rio 2016

8 years ago

Google Play CallJam Malware Infects Half A Million Users

The CallJam malware achieved a high ranking through deception while raking in funds through premium-rate calls

8 years ago

DDoS Website ‘Ringleaders’ Arrested In Israel

The two teenagers were arrested after DDoS giant vDOS was hacked and its internal records exposed last week

8 years ago

One Year Post-IPO, Sophos Extending Its Security Platform

Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016

8 years ago

Google Patches 55 Android Vulnerabilities in September Update

More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for…

8 years ago

Snowden Leaks Tie UK Spy Station To US Kill Operations

The latest documents leaked by Edward Snowden show a link between RAF Menwith Hill and US targeted strikes

8 years ago

Pokemon Themed ‘Umbreon’ Rootkit Hides In Linux Systems

Rootkit is the latest malicious code to use a Pokemon theme

8 years ago

Box And IBM Simplify Cloud Workflows With Box Relay

Boxworks 2016: Box and IBM continue partnership and promise Box Relay will reduce dependency on IT without sacrificing securirty

8 years ago

Apple Issues Patch For Mac OS X To Protect Against iOS Spying Flaw

Patch your Macs now. Apple issues emergency patch for attack that can turn Macs into spying devices

8 years ago

Cross Channel: Security Spend Isn’t Guarantee Of Success

The latest news from the world of the IT channel. This week sees security spend in the spotlight, differences between…

8 years ago

Ransomware, Malware Threats Rise in Second Quarter

The Quick Heal report outlines the top malware afflicting Windows and Android users, with a brief low-down on each of…

8 years ago

Cold War Group to Probe Russian Hacks of U.S. Voter Databases

ANALYSIS: A little-known cold war group is assigned to investigate suspected hacks into Democratic National Committee and state voter registration…

8 years ago

Rio 2016 Olympics Suffered Sustained 540Gbps DDoS Attacks

Arbor security claims Rio was a success in terms of mitigating powerful, prolonged DDoS attacks

8 years ago

SWIFT Warns Banks Of Ongoing Cyber Attacks

Sophisticated new hacking attacks against banking system are ongoing and persistent, warns SWIFT

8 years ago

Google Agrees To Privacy Shield Framwork

Google is latest giant to adhere to new rules about data transfer between Europe and the US

8 years ago

Run Apps In Docker If You Want Application Security

Often, new technologies raise security concerns. However, two reports claim it's safer to run applications inside containers than outside of…

8 years ago

Cross Channel: IBM Seeks EMC Customers And G-Cloud Concerns For SMBs

The latest news from the world of the IT channel. This week sees IBM making a flash storage push, a…

8 years ago

Apple Patches iPhone Spyware Vulnerabilities With iOS 9.3.5

I spy with my little iPhone! Apple rushes out iPhone patch after discovery of government spying hack

8 years ago

Researchers Warn Of ‘Epidemic’ Money-Flipping Malware On Instagram

Bank followers on Instagram beware of money-flipping 'epidemic', but photo-sharing platform says scams are "low volume"

8 years ago

Google Hits Back At ‘Intrusive’ Pop-Up Ads

New algorithm will demote mobile websites using interstitial adverts from January 2017

8 years ago

Universities Plagued By Ransomware Attacks

Yet only one university contacted the police about their attack, as criminals demand as much as £2,200

8 years ago

Security Researchers Discover First Twitter-Controlled Botnet

Twitoor, uncovered by ESET, can plague Android devices with malicious malware

8 years ago

French Submarines Spring A Leak In Indian Data Breach

Secret documents on Indian submarines built by French contractor DCNS have been leaked, according to Australian media

8 years ago

Yandex Offers ‘Complaint’ Button And AI As Alternative To Ad Blocking

Yandex, a major search engine in Russia, hopes to reach a compromise between users and advertisers as an alternative to…

8 years ago

Free Opera VPN App Arrives On Android

Opera says VPN offers better performance, privacy and choice on Android

8 years ago

Security Teams Not Keeping Up With Exponential Cloud Server Growth

Black Hat survey finds enterprises are increasing their attackable surface area by 100 times with a move to cloud infrastructure…

8 years ago

Linux Foundation Offering New Online Security Course

The Linux Foundation's new online Linux security training program will cover a broad range of topics, from application security to…

8 years ago

NHS Care.Data 2.0: What Should It Look Like?

Sooraj Shah says the NHS needs to be transparent and act swiftly so that patients can reap the rewards

8 years ago

Britain’s BullGuard Acquires Israel-Based IoT Security Startup

BullGuard buys into Internet of Things security space with smart home device acquisition

8 years ago