Water systems and power grids all at possible risk of attack, report warns
News Security Management
Cybercriminals Boost Professionalism As Zero-Day Flaw Discoveries Spiral Out Of Control
The rate of zero day vulnerability discoveries doubles in 2015 from 2014, as advanced attackers exploit, stockpile and resell High-Value Vulnerabilities
Safe Harbour 2.0 Not Adequate, Says WP29 Data Watchdog
The new data sharing agreement between Europe and the US may not be adequate, leak suggests
Fake CEO Email Scam Nets Fraudsters £1.6 Billion
Email from the boss? Better check it is really from the CEO and not a lowly fraudster, warns the FBI
FBI Admits Unlocking Method Is Useless On Current iPhones
Only older iPhone models can be unlocked using current methods, FBI says, as debate rumbles on
National Childbirth Trust Hit By Major Data Breach
Details of over 15,000 expectant parents leaked, including email addresses
Biometrics Offers The ‘Perfect Balance’ Of Security And Usability
Biometrics technology has been around for a while, now it’s time to utilise it properly, Intelligent Environments CTO tells TechWeekEurope
Windows 10 Adobe Flash Critical Flaw Is Being ‘Actively Exploited’
Windows 10 users at risk as Adobe readies patch for 'critical vulnerability' that is being 'actively exploited'
White House Refuses To Support Draft Encryption Bill
Obama refuses to enter debate surrounding controversial draft bill, that will require tech firms to help crack encryption
Swipebuster Uses Open API To Identify Tinder Users
Tinder's privacy comes into question as new service lets people find out who is using the application
IT Admins Just As Bad, If Not Worse, Than Employees At Changing Passwords
Administrators change their security credentials less frequently than user passwords, survey at RSA Conference finds
US Visa System Contains Security Flaws
Ever been to the US? Travel database of US state department contains flaws that could allow hackers to steal visa info
China Domain Proposals Prompt Web Crackdown Fears
Government proposal to create 'whitelist' of approved websites raises fears of further crackdowns on web users in China
Why Security Starts From The Device
HP's John O'Reilly explains why effective mobile productivity starts with robust security protection
‘Crucial’ Badlock Vulnerability Affects Windows, Samba
Samba and Microsoft engineers have warned system administrators to expect a critical patch on 12 April
Bank Of Russia Signs Up Machine Learning To Bust Fraud
Yandex machine learning service will allow Bank of Russia to spot fraudulent and unlicensed money lending organisations
TechWeek Readers Back Authorities Over Apple In Encryption Battle
Poll: 54 percent of readers say law enforcement agencies should be able to access phone data - but most say only in issue of national security
FBI ‘Independently Cracks’ iPhone And Drops Case Against Apple
FBI announces it has accessed the locked iPhone belonging to the San Bernardino shooter, claiming it "no longer requires the assistance from Apple"
Will The Next TalkTalk Breach Start On Mobile?
Lookout's Gert-Jan Schenk explains why the risks of mobile data breaches are something your organisation should be concerned about
Ransomware Recovery Worries IT Professionals
Security professionals pessimistic of recovery chances amid growing ransomware menace
Hackers Target Water Treatment Plant
Verizon security report reveals possible risks to citizens if utilities are hijacked, after water treatment tampered with several times during attack
Microsoft Office 2016 Blocks Malicious Macros
Microsoft released a new feature in Office 2016 that helps administrators prevent macro-based malware infections
Apple: Update iOS And Mac OS X Immediately To Avoid SIP Security Risk
Update for iOS and OS X users will keep them protected from damaging zero-day vulnerability
America To Charge Iranian Nationals Over Cyber-Attacks – Report
DoJ to file hacking charges against six Iranian nationals accused of hacking banks and New York dam
Met Police Chief: Don’t Reward Victims Of Online Fraud
Bernard Horgan-Howe says that focus should be on helping public improve online protection
Uber Offers “Treasure Map” For Friendly Hackers To Locate Bugs
X marks the spot. Transportation firm offers “treasure map” of computer system for hackers to find vulnerabilities
Israeli Firm Cellebrite To Help FBI Crack Encrypted iPhone – Report
The "third party" to help FBI crack the San Bernardino iPhone is reportedly Israeli forensic specialist Cellebrite
5 Ways To Prevent Personal Photos Being Stolen
Singer Adele experienced an invasion of privacy with personal photos being leaked after the hack of an email account. Here's how to stop it happening to you
Apple CEO Tim Cook: We Have A Responsibility To Fight For Privacy
Tim Cook thanks the public and other tech firms for their support in battle against the FBI over iPhone encryption
Ford, Audi, BMW Cars Vulnerable To Keyless Fob Hack
Secure your car's keyless fob in a farraday cage, after radio “amplification attack” unlocks cars