Firewall

How Facebook Users Can Thwart Imposters Who Spoof Their Identities

ANALYSIS: Scammers are spoofing the Facebook user's account names to engage in phony Messenger conversations to phish for information. Here's…

6 years ago

Former NSA Employee Pleads Guilty To Taking Top Secret Data Home

ANALYSIS: Yet another former NSA employee has taken secret information home, allegedly enabling Russian hackers to gain access to data.

6 years ago

PayPal’s TIO Networks Says Data Breach Impacts 1.6m Customers

PayPal only bought bill payment processor TIO Networks For £177m in July but has suspended operations

6 years ago

MPs’ Cybersecurity Admissions Highlight Need For Culture Change At Westminster

ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better

6 years ago

Morrisons ‘Ultimately Responsible’ For Rogue Employee Leaking Payroll Data

Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online

6 years ago

McAfee To Buy Skyhigh Networks In Cloud Cybersecurity Push

McAfee's first major acquisition as an independent security firm is Skyhigh Networks

6 years ago

‘Concerned’ UK Regulators Look Into Uber’s Hidden Data Breach

ICO and NCSC are looking into the scale of the Uber hack before they take next steps

6 years ago

Security Panel: What On Earth Was Uber Thinking?

Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?

6 years ago

Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen

New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…

6 years ago

Five Steps To Keep North Korean Hackers Out Of Your Network

ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…

6 years ago

CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates

CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software

6 years ago

IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security

At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…

6 years ago

North Korea Getting Ready Wage A Global Cyber War, Experts Say

ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…

6 years ago

Cash Converters Admits Data Breach After Website Hack

Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters

6 years ago

Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack

Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…

6 years ago

MIT Helping To Define New Model To Restore Trust In Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…

6 years ago

Apple iPhone X Face ID ‘Is Tricked’ By 3D Printed Mask

Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure

6 years ago

IT LIFE: Toni Gidwani, Threat Connect

ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks…

6 years ago

Sowbug Hacking Group Targets South America & Asian Governments

Previously unknown hacking group found targeting foreign policy and diplomatic targets

6 years ago

News Of NYC Terror Attack Changes Focus Of Senate Social Media Hearing

ANALYSIS: Experts on international terrorism turn from describing how terrorists use social media to reporting the level of chatter on…

6 years ago

Equifax Data Breach: Investigation Shows 15.2m UK Records Targeted

Equifax will contact 694,000 UK customers at high risk following huge data breach last month

7 years ago

Government Demands Social Networks Remove Abusive Content

Government announces plans to tackle cyber bullying and improve Internet safety education

7 years ago

Uber Says It’s Removing Secret Screen-Viewing Access To iOS Devices

ANALYSIS: Undisclosed entitlement allowed Uber to access to an iOS device’s frame buffer, which in turn could let the company…

7 years ago

HMRC Stops Phone Scammers Reaching 1m People

HMRC takes control of scam websites promoting misleading and expensive phone services

7 years ago

Is The Current Cybersecurity Model Sustainable In The World Of AI, AR & IoT?

IP EXPO 2017: Cybersecurity heavyweights discuss the future of the industry, noting that the answers may be in its past

7 years ago

Congress Grills Former Equifax CEO Over Data Breach

Richard Smith, ex-CEO of Equifax, spent two days answering questions from Congress about the data breach that exposed information on…

7 years ago

Law Lessons: Facebook’s Spanish Fine Highlights Importance Of GDPR Readiness

ANALYSIS: Much of the conversation around GDPR has focused on the security implications for businesses, but what about privacy?

7 years ago