Virus

Newly Discovered Android Malware Physically Wrecks Phones

The Loapi malware, which poses as adult or security apps, runs processor-intensive scams that can cause a phone to overheat…

6 years ago

TRITON Attack Targeted Critical Infrastructure, Security Firm Says

FireEye warns that a nation-state appears to be infiltrating critical-infrastructure sites and developing ways to cause physical damage

6 years ago

1998 Vintage Cryptography Vulnerability Known As ROBOT Re-Emerges

The Cryptography vulnerability first detailed in 1998, still has the potential to impact modern websites

6 years ago

US Law Bans Kaspersky Security Products From Government Systems

US government passes law that bans government agencies from using Kaspersky Lab security tools

6 years ago

How Facebook Users Can Thwart Imposters Who Spoof Their Identities

ANALYSIS: Scammers are spoofing the Facebook user's account names to engage in phony Messenger conversations to phish for information. Here's…

6 years ago

Former NSA Employee Pleads Guilty To Taking Top Secret Data Home

ANALYSIS: Yet another former NSA employee has taken secret information home, allegedly enabling Russian hackers to gain access to data.

6 years ago

PayPal’s TIO Networks Says Data Breach Impacts 1.6m Customers

PayPal only bought bill payment processor TIO Networks For £177m in July but has suspended operations

6 years ago

MPs’ Cybersecurity Admissions Highlight Need For Culture Change At Westminster

ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better

6 years ago

Morrisons ‘Ultimately Responsible’ For Rogue Employee Leaking Payroll Data

Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online

6 years ago

McAfee To Buy Skyhigh Networks In Cloud Cybersecurity Push

McAfee's first major acquisition as an independent security firm is Skyhigh Networks

6 years ago

‘Concerned’ UK Regulators Look Into Uber’s Hidden Data Breach

ICO and NCSC are looking into the scale of the Uber hack before they take next steps

6 years ago

Security Panel: What On Earth Was Uber Thinking?

Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?

6 years ago

Uber ‘Hid’ Hack That Saw 58m Users And Drivers’ Data Stolen

New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…

6 years ago

Five Steps To Keep North Korean Hackers Out Of Your Network

ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…

6 years ago

CA ‘Modern Software Factory’ Boosted By DevOps, Automation & Security Updates

CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software

6 years ago

IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security

At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…

6 years ago

North Korea Getting Ready Wage A Global Cyber War, Experts Say

ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…

6 years ago

Cash Converters Admits Data Breach After Website Hack

Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters

6 years ago

Kaspersky Investigation ‘Proves’ Its Products Were Not Used In NSA Hack

Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…

6 years ago

MIT Helping To Define New Model To Restore Trust In Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…

6 years ago

Apple iPhone X Face ID ‘Is Tricked’ By 3D Printed Mask

Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure

6 years ago

IT LIFE: Toni Gidwani, Threat Connect

ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks…

6 years ago

Sowbug Hacking Group Targets South America & Asian Governments

Previously unknown hacking group found targeting foreign policy and diplomatic targets

6 years ago

News Of NYC Terror Attack Changes Focus Of Senate Social Media Hearing

ANALYSIS: Experts on international terrorism turn from describing how terrorists use social media to reporting the level of chatter on…

6 years ago

North Korea Slams UK Claims It’s To Blame For WannaCry

The nation dismisses Britain's security minister's claims as "groundless speculation"

6 years ago

Bad Rabbit Ransomware Hits Russia And Ukraine

The ransomware appears to be a variant of the Petya ransomware

6 years ago

Mac Users Targeted By Malware Unwittingly Distributed By A Popular Media Player

ESET says it found the OSX/Proton malware in a version of Eltima's media player

7 years ago

Equifax Data Breach: Investigation Shows 15.2m UK Records Targeted

Equifax will contact 694,000 UK customers at high risk following huge data breach last month

7 years ago