CyberCrime

Criminal Marketplace Offers Cheap Server Access For Global Cyber-Attacks

Fancy a DDoS attack? Cybercrime marketplace offers access to compromised third party servers for just £4.23

8 years ago

Donald Trump Data Pilfered After Democrat Hack By Russians

Democrat computer hacked by Russian intelligence agencies and lifted opposition data on 'The Donald'

8 years ago

Euro 2016: What Are The Biggest Security Threats?

Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…

8 years ago

Malicious Documents Use New Tricks To Evade Detection, Warns Zscaler

Attackers utilise social engineering to lure MS Word users to enable macros in order to avoid cyber detection

8 years ago

uTorrent Hack Exposes Account Details And Passwords

Undergound data breach. Up to 35,000 user accounts on the uTorrent community forums exposed after hack

8 years ago

Infosec 2016: Shadow IT Lets Employees Take Company Data To New Jobs

Blue Coat research shows significant amounts of cloud use in firms is not sanctioned

8 years ago

InfoSec 2016: Malwarebytes – Beware The Growing Ransomware Risk

2016 is set to be “the year of the ransom” as threat continues to grow, Malwarebytes claims

8 years ago

InfoSec 2016: Apple Users Targeted By Fake Domains

Beware malicious websites posing as legitimate Apple presence, FireEye warns

8 years ago

InfoSec 2016: Facebook Messenger “Left Open To Hackers”

Check Point research finds both Messenger and Facebook Chat can be exploited with simple HTML tweak that would allow hackers…

8 years ago

New Trojan Uses Zeus Tricks To Target Russian Banks

Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems

8 years ago

Mark Zuckerberg Hit By LinkedIn Password Hack

Facebook founder Mark Zuckerberg attacked after login details allegedly leaked in LinkedIn breach last month

8 years ago

SWIFT Tightens Security Measures After Banking Incidents

"Better shape up" SWIFT tells banks with weak cyber security procedures, in wake of recent attacks

8 years ago

Investigatory Powers Bill Given Cautious Support By Human Rights Committee

Journalist sources must be protected says committee of MPs, but admits bulk data collection can be justified

8 years ago

Visit TechWeekEurope At Infosec 2016 And Win An Apple Watch

TechWeekEurope will be at Europe's biggest cybersecurity event next week, speaking to the biggest names in the field and sharing…

8 years ago

Stuxnet-Esque Irongate Malware Targets Industrial Control Systems

FireEye Labs uncover strange malware, similar to Stuxnet, that has targeted industrial controls for years

8 years ago

Microsoft Boosts Office 365 Security With Threat Detection, Visibility Tools

Microsoft says Advanced Security Management can protect networks and make Office 365 deployments more effective with new dashboard

8 years ago

Fake FIFA Apps Highlight Malware Concerns Ahead Of Euro 2016

Researchers find pretend FIFA apps full of adware on Google Play Store amid fears Euro 2016 could trick more people…

8 years ago

Criminals Offer Windows Zero-Day For £66,000 In Bitcoin

Zero days are coming out of the shadows and are fast becoming a commodity for the criminal masses, warns Trustwave

8 years ago

PC Manufacturers Are Placing Users At Risk With Software Updaters

Reality check. Its “far too easy” to break OEM updaters, and every one tested by Duo Labs contained a vulnerability

8 years ago

US Police Don’t Need A Warrant To Track Mobile Users

Privacy setback? US appeals court rules police don't need warrant to obtain cell tower records from mobile operators

8 years ago

Web Publishers Need To Address Reasons Why Readers Install Ad Blockers

ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their…

8 years ago

Microsoft Bans Simple Passwords On All Its Accounts

Microsoft announces complete ban of simple or commonly used passwords from all of its accounts

8 years ago

Malwarebytes Extends Malware Protection To Mac Users

Mac attack. Growing ransomware threat on Mac sees security vendor extend its enterprise tool to Apple platform

8 years ago

National Cyber Security Centre To Offer Cyber Advice For Businesses

Government announces GCHQ's National Cyber Security Centre to provide businesses with security guidance

8 years ago

TeslaCrypt Ransomware Criminals ‘Retire’, Hand Over Master Key

Ransomware gang closes down and gives crypto key to ESET, but reasons are unknown

8 years ago

Bank Of England Orders SWIFT Security Review

UK banks ordered to review their cyber security measures after the SWIFT Bank Bangladesh heist

8 years ago

Security For Google’s New Home Assistant May Get Lost On The IoT

GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think…

8 years ago

Consumers Are ‘Confused’ About Security And Privacy Priorities

Consumers are deeply conflicted over national security versus privacy, but still willing to share data with social networks

8 years ago

How To Maximise Data Protection In Today’s Threat Landscape

Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their…

8 years ago

Hacking Forum Hack Exposes 473,000 Members And 2.2m Posts

Nulled.IO forum used to sell credentials and cracks is itself hacked, potentially allowing law enforcement to solve other attacks

8 years ago