A vulnerability in Flash is being actively exploited, prompting Adobe to issue an emergency patch
News security
Dirty COW Linux Flaw Can Root Android Devices
Long standing Linux vulnerability also impacts Android and can be used to root devices, researcher warns
Microsoft Azure IoT Protects Against Cyber Attacks With Expert-Driven Security Program
Third-party security auditors will be brought in to help Microsoft Azure customers secure their Internet of Things deployments
Researchers Demonstrate How LTE Communications Can Be Hacked
Attackers using low-cost equipment could force handsets to use malicious networks, researchers find
US Names Arrested Russian As Alleged LinkedIn, Dropbox Hacker
Yevigeniy Nikulin, a 29-year-old Moscow resident, allegedly conspired with two others to hack LinkedIn, Dropbox and other sites
Apple Bug Lets Malicious JPEGs Take Over iPhone, Mac & Apple Watch
Apple has fixed the dangerous bug in updates for iOS, WatchOS and MacOS
‘Sophisticated’ DNS Attack Used IoT Gadgets To Target Dyn
The DDoS attack was unusual in its scale and was backed up by a large Mirai IoT botnet, Dyn says
Researcher Breaches PayPal’s Two-Factor Authentication In Five Minutes
The surprisingly simple hack tricked PayPal into giving the researcher access to his own account
Banks Are ‘Hoarding’ Bitcoin To Pay Attackers
British financial institutions are reportedly looking into buying up stocks of bitcoin that could be used to pay off denial-of-service attackers
Massive Cyber-Attack Shows Risk Of Poor Security On Network Nodes
ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas of the internet are still unclear, insecure endpoints are the likely culprit
Tech Quiz Of The Week: Dell
DELL EMC WORLD 2016: Dell has undergone yet another transformation, but what do you now about technology's original startup?
Twitter, Spotify And Other Major Sites Disrupted By DDoS Attack On Dyn DNS
The attack was made against DNS host provider Dyn, which provides a traffic routing service for the sites.
First Fruits of Dell EMC Union Appear In Storage, Hyperconverged Infrastructure Products
DELL EMC WORLD 2016: Just six weeks in, Dell EMC merger is making its mark in storage, HCI and security
Microsoft To Show Source Code To Brazilian Officials
Amid concern of spy backdoors in its software, Microsoft opens code inspection centre in Brazil
What Makes Ransomware the Worst Type of Malware
In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in mind for the U.S
Oracle Fixes 253 Security Flaws In October Update
Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.
Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild
The bug affects most versions of Linux potentially exposing huge numbers of machines to hackers
Yahoo Calls For US Intelligence To Declassify Email Surveillance Order
UPDATED: The email giant wants the US government to publish the order so it can accurately respond to claims it scanned customer emails
VMware Urges Businesses To Stay Secure In An IoT-Enabled Virtual World
VMWORLD 2016: Digital transformation is exciting for many businesses, but VMware has made sure that security plays an integral role
Malwarebytes Snaps-Up French Startup AdwCleaner
The acquisition gives Malwarebytes access to the startup's adware an unwanted programe fighting tool
Digital infrastructure At Risk From Security Flaws In Java And Open Source
Veracode reveals 97 percent of Java applications contain at least on security vulnerability
Thousands Of London Police Get Wearable Video Cameras
The body-worn video cameras are to be rolled out to 22,000 officers across London's 32 boroughs
Ghost Push Dominates Android Malware
Malware makes up at least one percent of all daily Android app installs, finds study
Facebook Awards $5m As Bug Bounty Scheme Turns Five
The programme has paid more than $5m to 900 researchers since 2011
US Legislators Demand Briefing On Yahoo Email Scan
Lawmakers want to judge the legality of intelligence services' access to Yahoo Mail
Selfie Stealing Android Trojan Discovered By McAfee Labs
Tweaked Acecard trojan aims to trick gullible Android users into sending selfies and photos of their IDs
Banks ‘Under-Reporting Cyber Attacks’ Say Security Firms
Banks are not providing enough details on cyber-attacks in order to downplay security fears, say insiders
Cross Channel: Tax Dodging Consultants And Red Hat Reselling Expanded
Distribution deals and acquisitions were the flavour of the week in the channel world
Foxconn Firmware Flaw Leaves Android Devices Vulnerable To USB Hack
Dubbed Pork Explosion the flaw allows Android security protocols to be bypassed
Thousands Of Online Stores Fail To Protect Payment Details From Hackers
Shop shock. Hackers have compromised nearly 6,000 online shops to skim payment card data. And the problem is getting worse