The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny
News CyberCrime
Apple iOS 10.2 Public Beta Strengthens iTunes Backup Encryption
The Cupertino company boasts backup encryption that will take 1,000 years to hack
Splunk: Machine Data Could Be The Key To Tackling Cyber Threats
INTERVIEW: Splunk's security evangelist Matthias Maier talk bolstering cyber defences with machine data
Google Issues Supplemental Android Patch For Dirty COW Linux Security Hole
Latest security bulletin from Google's Android looks to help plug the Linux hole
Patch Tuesday November 2016: Microsoft Fixes Flaw Controversially Outed By Google
No surprises here. Patch Tuesday arrives to fix vulnerability that is being exploited by Russian hackers
US Election Hack Warning From Cyber Security Experts
Experts warn the US election could be disrupted by hackers, and warn authorities to closely watch key US states
Darktrace: Machine Learning Will Filter Through The Noise Of Cyber Security
INTERVIEW: Machine learning can help filter the increasing noise on complex IT networks to spot the emerging cyber threats that pressured tech teams might miss.
Cisco Admits Incorrect Security Setup Caused Job Applicant Data Leak
Privacy facepalm. Personal details of people applying for jobs at Cisco leaked from unsecure website
Chess Champion Seeks Microsoft Protection From Russian Hackers
Current world chess champion appoints Microsoft to bolster cyber defences ahead of showdown with Putin's lacky
Machine Learning And AI Could Be The Future Of Cyber Security
IN-DEPTH: As the war against malware rages, smart software could be the key to getting ahead of hackers
Tesco Bank Halts Transactions After Online Fraud
Cash taken from 40,000 bank accounts over the weekend, prompting Tesco to halt online transactions
China Adopts Controversial Cybersecurity Law Despite Foreign Criticism Over Internet Freedoms
The legislation could put further privacy and security pressures on foreign companies trying to operate in China
Corporate IT, Security Teams Need to Put Aside Mutual Distrust
ANALYSIS: For years a major threat to enterprises has been a gap between IT departments and the security teams competing for influence and funding
Ukrainian Hackers Claim To Have Breached And Leaked Kremlin Emails
The emails purportedly show Russia could have a plan to carve up pro-Russian parts of Ukraine
Yandex Is The First Russian Tech Firm To Join The CVE
The company wants to be transparent in how it discovers and protects against cyber security flaws
Cyber Security Challenge UK Tasks Hackers With Energy Firm Defence
Challenge sees amateurs battle to protect energy firm from cyber attacks, both internal and external
Zero-Day Security Hole In Wix Hosting Service Exposed Millions Of Websites
Infected sites could have been turned into botnets to launch DDoS attacks and spread malware
National Cyber Security Centre Head: Fearmongering Must Be Replaced With Facts
National Cyber Security Centre chief Dr Ian Levy wants an empirical, transparent approach to cybersecurity policy - not hysteria
Facebook Blocks Insurance Firm Admiral From Using Profile Data
Is Facebook a privacy champion? Admiral banned from using FB data in order to price insurance policies
Microsoft Blames Russia For Exploiting Google-Exposed Windows Flaw
Microsoft says Russian hackers behind exploit of unpatched Windows flaw, revealed by Google
Sir Tim Berners-Lee: Hackers Could Exploit Open Data To Wreak Real-World Chaos
ODI founders want the government to consider open data as critical infrastructure that needs protection
UK Government Pledges ‘To Strike Back’ In Cyberwar As It Invests £1.9bn In Cybersecurity
Philip Hammond outlines the government's new cybersecurity strategy and how £1.9 billion will boost defences, enable law enforcement and aid country
ShadowBrokers Data Dump Leaks Compromised Servers Used By NSA For Hacking Operations
The servers are claimed to have been used by NSA-sponsored Equation Group as staging areas for covert hacking activity
Twitter’s Sponsored Tweets Used For Credit Card Phishing
Malwarebytes finds a scam masquerading under the offer of Twitter verification
Google’s AI Neural Networks Learn To Create Their Own Encryption
Two neural nets were created to communicate securely while a third tried to crack their inhuman cipher messages
Data Breach Exposes 550,000 Australian Red Cross Blood Service Donors
Security flaws on the organisation’s website led to personal data bleeding out after a basic hack attack
Government’s Free Train Wi-Fi Project Has ‘No Mandatory Cybersecurity Guidelines’
FoI request shows train operators that apply for £50m free wi-fi fund will be left to their own devices when it comes to cyberscurity
Tech Support Scam Uses Fake ‘Blue Screen Of Death’
New malware scam urges users to call a number when confronted with a fake blue screen of death
Adobe Rushes Out Emergency Patch For Flash
A vulnerability in Flash is being actively exploited, prompting Adobe to issue an emergency patch
Dirty COW Linux Flaw Can Root Android Devices
Long standing Linux vulnerability also impacts Android and can be used to root devices, researcher warns