Cloud Conformity acquisition aimed at helping customers guard against misconfigured public cloud accounts, beginning with Amazon Web Services
News security
Smart Speakers Hacked To Listen In, Steal Passwords
Malicious third-party apps for Google Home and Amazon's Alexa can listen in on conversations and trick users into revealing passwords
Russian Cyber-Spies ‘Hijacked Iranian Attack Infrastructure’
Turla hacking group carried out at least 20 successful cyber-raids around the world using Iranian attack tools, NCSC says
Equity Firm Buys UK’s Sophos For £3.1bn
Acquisition of Oxfordshire-based cyber-security firm, which aided NHS during WannaCry attacks, follows fall in value of sterling in wake of 2016 Brexit vote
Developers Reduce Firefox Code Injection Exposure
Mozilla has removed features that exposed the browser to code injection attacks via its about: pages and JavaScript's 'dangerous' eval() function
Windows 10 Preview Build Adds Security, Smartphone Features
Users can now log into Safe Mode with a PIN, Your Phone features roll out to newer Samsung devices and Windows Subsystem for Linux gets bug fixes
Programmer Hacks Ransomware Crooks, Releases Decryption Keys
German developer releases thousands of decryption keys for Muhstik ransomware after being forced to pay out £600 to decrypt his files
Programming Shortcuts ‘Lead To Security Risks’
New research highlights vulnerability risk of using potentially insecure code snippets posted on social media outlets such as Stack Overflow
Met Police ‘Provided Seven Images’ For King’s Cross Face Recognition Scheme
Police acknowledge working with private King's Cross developer on face recognition scheme, amidst ongoing concern about the use of the tracking tech
Researchers Crack PDF Encryption
Two variants of 'PDFex' attack could allow PDF documents to be modified so that their contents are automatically exfiltrated to an attacker
Mac Malware Pretends To Be Share-Trading App
Newly discovered Mac malware includes copy of real share-trading app, but also steals data and carries out other malicious functions in the background
Targeted Cyber-Attacks Hit Transportation Firms
Palo Alto Networks' Unit 42 finds previously unknown tools used in attacks on transportation and shipping firms in Kuwait
Microsoft Rolls Back Windows 10 Change That Caused Audio Glitches
Issue is an embarrassment for Microsoft, whose recent Windows 10 bug-fixes have been plagued with problems of their own
Hacker Group Looks To Gain Control Over Vulnerable WordPress Sites
Attack that began in July takes on new form as hackers begin creating rogue administrator accounts on unpatched sites
Hackers Take Over Jack Dorsey’s Twitter Account
The account was used to broadcast offensive messages to more than four million followers following a hack of Dorsey's mobile phone number
Capital One Hack Suspect Ordered To Remain In Prison
Seattle resident seen as presenting a flight risk and a threat to herself and others following breach that affected 106 million banking customers
UK Teen Sentenced For Hacking, Selling Personal Data
Norwich 19-year-old found to have made hundreds of thousands of pounds in Bitcoin from selling compromised personal data and on-demand hacking services
Adware Hidden In Play Store Apps Infects 8 Million Users
Malware found in 85 apps posing as games or photography utilities displays full-screen ads and takes 'unique' steps to avoid detection
Cloud Atlas Threat Group Adds Shape-Changing Attack Tools
Prolific cyber-espionage group uses polymorphic malware in targeted phishing emails, making threats more difficult to defend against
King’s Cross District Tracks Visitors Using Face Recognition
Canary Wharf also said to be considering private face recognition trials, in spite of controversy over police use of the technology
Understanding hybrid cloud security across your enterprise
Broadcom In ‘Advanced Talks’ To Acquire Symantec – Again
Weeks after Symantec walked away after price disagreement, reports suggest the two are close to a deal
Far-Right Website 8chan Offline After Cloudflare Withdraws Services
Site goes offline following involvement in shootings in Texas, with Cloudflare accusing it of 'directly inspiring tragic events'
Nvidia Patches High-Risk Flaws In Windows Display Drivers
Bugs in GeForce, Quadro, NVS, and Tesla drivers could allow local code execution, denial of service or escalation fo security preferences
Destructive Cyber-Attacks Double In First Half Of 2019
Attacks seeking to wreak havoc on targets' systems have risen sharply, with the manufacturing sector accounting for half of all incidents, finds IBM X-Force
Google Offers UK Users Titan Security Key
Small security key connects via Bluetooth or USB, and is designed to bolster two-factor authentication efforts for consumers
Swiss Post Suspends Drone Delivery Trials Following Crash
Tests of drone-based medical delivery system halted after delivery drone's parachute malfunctions, causing it to crash 50 yards from group of playing children
Google Reveals Multiple Remote iPhone Flaws
Bugs discovered by Google's Project Zero can be exploited with no user interaction to execute malicious code - with one flaw still remaining to be fixed
Huawei Sees ‘Difficulties’ Ahead As Revenues Surge
Revenues jumped by 23 percent and smartphone sales by 24 percent in the first half, ahead of US blacklist move in May
Researchers Crack £30 Limit On Contactless Visa Cards
Using an interception device, researchers trick cards, terminals and mobile wallets into making payments over the limit with no additional verification