Superfish take two? Oracle is now bundling Ask.com adware on Mac computers via the Java installation
News Security Management
Pentagon Seeks Hacker Proof Weapon Systems
The top American arms buyer wants future US weapon systems to be hacker-proof
Box Looks To BYOD With Subspace Acquisition
Cloud storage player buys startup that offers staff browser-based access to enterprise applications
Mandarin Oriental Admits Credit Card Data Breach
Upscale Mandarin Oriental hotel chain, which boasts 27 properties around the globe, is investigating a malware attack on guests' financial data
China Hits Back At Obama Over Software Backdoors
The war of words escalates between America and China over its demand for a backdoor in foreign software
Android Suffers ‘Gazon’ Malware Outbreak
Android users beware of new malware threat from fake app promising Amazon vouchers
Apple Promises Fix For FREAK Encryption Flaw
Google and Apple promise to rush fix for legacy security vulnerability affecting Macs and mobiles
MWC 2015 – Silent Circle Launches ‘World’s First’ Enterprise Privacy Platform
The platform, including Blackphone 2 and Blackphone+, is said to address the failures of traditional security solutions
Teenager Hacks High School To Improve Grades
American student tests his cyberskills with hack of high school network to bolster exam results
Spam Campaign Exploits Router Security Flaws, Proofpoint Warns
Cybercriminals using phishing techniques to exploit router vulnerabilities, including weak passwords
10 Apps Packed Full Of ‘Aggressive’ Adware Pulled From Google Play
Bitdefender warns that the mobile adware resembles that found on PCs, delivering a barrage of ads
Ramnit Botnet Crime Ring Taken Down By Europol
Euro cops shut down botnet that infected 3.2 million computers in order to steal banking information
Lizard Squad Hacks Lenovo Website And Intercepts Emails
Lenovo's main corporate website compromised in apparent revenge for Superfish adware
DDoS Attacks Will Do More Than Tickle The Internet Of Things’ Soft Underbelly
Nexusguard's 2015 Internet Security Trend report reveals DDoS assaults on the Internet of Things will cost businesses millions of pounds
UK Small Businesses ‘Don’t Care About Cybersecurity’
Cyber Streetwise report finds many SMBs don’t know where to start to protect their business
Cyber Security: 4 Key Steps To Resilience
John Green, business and technology development director at IT security firm Accumuli, advises on how to get tough on cyber attacks
LinkedIn Settles Password Theft Lawsuit
LinkedIn pays nearly £1m to settle legal fight after security breach compromised 6.5 million user passwords
FBI Offers Biggest Ever Reward For Admin Of Gameover Zeus Botnet
Russian hacker behind the Gameover Zeus botnet is hit with world's largest ever reward for his arrest
Gemalto Hack Probe Confirms US, UK Spy Link
Gemalto's 'thorough investigation' concludes GCHQ and the NSA was probably behind 'sophisticated intrusion'
HUGE Parking Ticket Data Breach Highlights Business Security Weaknesses
Data of 10,000 drivers leaked online after PaymyPCN.net database security gaff
2014 Was A Record Year For Cyber Attacks
Hackers increasingly went mobile last year, with Point of Sale terminals also key targets, Trend Micro report reveals
Get Real: Are You In Denial About Online Security?
Study by Ping Identity shows half of consumers use the same password across multiple websites
A Third Of Brits ‘Have Lied To Protect Our Online Privacy’
Symantec report finds we trust hospitals and banks with our data, but not retailers or social media sites
How To Explain Phishing To A Five-Year-Old
The definitive definition of phishing (not fishing) from the experts for the kids (and adults, too)
Most Security Breaches ‘From Well-Known Sources’, Says HP
44 percent of breaches in 2014 were caused by known vulnerabilities between two and four years old, report finds
Has Avast Just Launched The World’s First Free Business-Grade IT Security?
Avast for Business is said to bring straightforward, cross-platform and cloud-managed security to the market
5 steps to optimise PCI DSS compliance across the supply chain
Kurt Mueffelmann, CEO at IT security firm Cryptzone, explains how you can optimise Payment Card Industry Data Security Standard compliance (PCI DSS)
10 Steps To Mitigate A DDoS Attack In Real Time
Gary Newe, systems engineer, F5 Networks, recommends taking 10 decisive actions when you come under DDoS attack
Superfish Adware: Should We Send Lenovo To The Naughty Step?
What can Lenovo's customers do about its sneaky adware, and how will Superfish impact the company's brand reputation?
The Critics’ View: Biometric Security For Mobile Banking
TechWeekEurope gets the expert’s views on RBS and NatWest’s plans for fingerprint scanning logins