infosec

Ransomware, Malware Threats Rise in Second Quarter

The Quick Heal report outlines the top malware afflicting Windows and Android users, with a brief low-down on each of…

5 years ago

Rio 2016 Olympics Suffered Sustained 540Gbps DDoS Attacks

Arbor security claims Rio was a success in terms of mitigating powerful, prolonged DDoS attacks

5 years ago

Web Users Are Still Being Tracked By Their Smartphone’s Battery Status

Battery Status API in HTML5 is being used to track user activity, warn security researchers

5 years ago

Quiz Of The Week: Cybersecurity In 2016

Test your mettle with our quiz and see how much you know about the cybersecurity world this year

5 years ago

UK Will Be ‘More Vulnerable’ To Cyber Attacks If It Leaves The EU

InfoSec poll reveals security professionals thing UK will suffer from lack of information sharing if it decides to leave the…

5 years ago

Infosec 2016: Two Thirds Of Security Pros Say Brexit Won’t Hurt UK’s Cyber Defence

If the UK decides to leave the EU, there will be no change in UK’s ability to protect itself, think…

5 years ago

InfoSec 2016: Two Worlds Are Colliding, And I Don’t Have The Answer, Says Bruce Schneier

Schneier also sees more government meddling in IoT security as ‘inevitable’

5 years ago

How To Manage Cyber Vulnerability In A Threatening World

Nine tenths of UK organisations feel vulnerable to cyber threats – where should your priorities lie?

5 years ago

Infosec 2016: Mikko Hyppönen Blames North Korea For SWIFT Attacks

Hyppönen claims we're in a new era where the 'fog of cyberwar' is preventing us from knowing who is attacking…

5 years ago

Ukraine Sitting On ‘Powder Keg’ Of More Cyber Attacks

Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are…

5 years ago

Asda Website Flaw Exposes Shoppers For Almost Two Years

A vulnerability in Asda's website found by a security consultant in March 2014 was left unchecked, but Asda claims no…

5 years ago

Amazon Issues Password Warning Following Potential Security Slip Up

Amazon emails number of users advising password reset because of "improper" storage

5 years ago

GCHQ Launches £6.5m CyberInvest Security Research Scheme

Taxpayers foot multimillion pound GCHQ bill for better protecting the UK in cyberspace

5 years ago

Half Of Second-Hand Hard Drives Sold on eBay, Amazon Still Contain Personal Data

And even though many have them have had wipe attempts, texts, photos, and emails still persist on hard drives and…

6 years ago

Amazon Web Services Under Threat From Crypto Key Vulnerability

Researchers claim attackers can exploit co-located virtual machines to scoop up RSA keys of other users on Amazon's EC2 cloud…

6 years ago

Higher Costs Dampen Palo Alto Networks’ Bumper Revenue

Palo Alto Networks eyes rise to the top with 2015 billings growing 58 percent year-over-year

6 years ago

Spotify Users Angered Over New Privacy Policy

Spotify wants access to a whole new cache of user data, including photos, social media and location

6 years ago

Adobe Patches 34 More Bugs In Flash

Adobe's August Patch Tuesday update provides fixes for 34 identified Common Vulnerabilities and Exposures (CVEs)

6 years ago

Carphone Warehouse Hack Could Leave 2.4m Customers’ Data At Risk

Shares fall two percent as phone retailer suffers cyber attack that compromises credit card details, names and addresses of customers

6 years ago

New Techniques Could Prevent Use-After-Free Exploits: Black Hat

The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that…

6 years ago

Google To Let Cloud Customers Use Own Keys To Encrypt Data

Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says

6 years ago

Pakistani Government Orders Operators To Shut Down BlackBerry Services

Pakistan’s mobile operators ordered to shut down BlackBerry Enterprise Services amidst encrypted communications fear

6 years ago

Microsoft Promises Advanced Threat Analytics Launch Next Month

On-premise cyber security platform will feature social media-style timeline and use machine learning to outwit the hackers

6 years ago

Drone Encryption Hardware Is About To Be Deployed In British Army Tanks

ViaSat wins General Dynamics contract for Scout SV encryption tech following successful use in Watchkeeper drones

6 years ago

Hacking Team Developed Wi-Fi Hijacking Hardware For Drones

Hardware for attacking computers via Wi-Fi caught the attention of a Boeing defense subsidiary, which wanted to use its drones…

6 years ago

Businesses ‘Becoming Complacent’ Over Danger Of DDoS Attacks

F5 study reveals security concerns over DDoS are falling, despite the number of attacks being on the rise

6 years ago

Kaspersky Lab Launches Small Office Security

Cloud-based password management stores critical company login details and enables users to have a different, unique password for every secure…

6 years ago

Four Ways UK SMBs Can Mitigate Data Breach Risk

How can an SMB avoid compromising its data? Andrew Thomas from CSID says it boils down to four easily digestible…

6 years ago

Eric Cole: A Good Cyber Offence Is Not The Best Cyber Defence

Dr Eric Cole, who has just joined InfoSec Hall Of Fame, warns that most countries are not ready for cyber…

7 years ago

InfoSec 2014: 17 Percent Of All Thefts In The UK Threaten Victim Privacy

According to police records, 162,932 items of computing and communications equipment were stolen in the UK in the past year

7 years ago