Email
Password
Remember meForgot password?
    Log in with Twitter

Cyberattack News

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

As Internet of Things technology expands do security risks rise?

For many businesses in 2018, Internet of Things technology will play a major part. A significant increase in spend and different technology types is predicted in a new report. However, does expansion bring more security concerns?

Cybersecurity trends for 2018

This year's big technology headlines have focused on cybersecurity and the range of businesses affected by cyberattacks. To help protect businesses in 2018, cybersecurity service firm Zenedge provides answers.

Making cybersecurity stronger in harsh environments

Remaining protected from cyber attacks is diffiucult at the best of times. It is more challenging in extreme environments, such as a war zone. New research offers some solutions.

Botnet of 100,000 routers could unleash cyberattack at any moment

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Android cyberattack combines phishing and data theft

Cybercriminals have combined three techniques into a single campaign, creating an attack that can steal credentials, phish credit cards and install bank Trojans. Based on an "increasingly sophisticated" form of malware, it targeted Austrian bank users.

Interview: Joe Stuntz on cybersecurity and One World Identity Special

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

Deloitte suffered silent data breach it took six months to find

Deloitte has confirmed a data breach allowed attackers to steal confidential client emails. The incident went unnoticed for months and only became public knowledge after a Guardian report today. It was caused by a basic email security lapse.

CCleaner malware might have been designed to steal trade secrets

The malware found bundled with popular computer maintenance software CCleaner was designed to compromise machines at some of the world's biggest tech companies. The discovery suggests the attack was more significant than first thought.

New cybersecurity solution for small businesses

CYBONET, the international information security solutions provider based in Israel, has a new initiative Cybowall, which is a threat detection and response platform designed for SMEs.

8 billion Bluetooth devices at risk of attack

Security researchers have discovered a flaw in Bluetooth that leaves almost every Bluetooth-enabled device vulnerable. It gives the attacker the ability to run malicious code. It's an example of what could go wrong with the Internet of Things.

Cyberattack leaves millions without mobile phone service in Venezuela

Caracas - A massive cyberattack that took down government websites in Venezuela earlier this week also has left seven million mobile phone users without service, the government said Thursday.

Digital health users need to be mindful of security risk

The transition of more and more health information into a digital format can lead to many benefits, especially in terms of the speed of analysis. It can also present risks, in terms of cybersecurity. Risks are highlighted in a new report.

Cyberattacks: What businesses can do

The threat from the destructive piece of ransomware, dubbed WannaCry, has dissipated, but this doesn’t mean businesses are no longer vulnerable to attack. We take stock of the best advice for businesses.

WikiLeaks reveals CIA malware for hacking Linux computers

The CIA has developed strains of malware specifically designed to target Linux computers. The existence of the malware, known as OutlawCountry, was revealed by WikiLeaks. It demonstrates the CIA is intent on accessing all kinds of computer system.

'Ransomware' wave seemed aimed at old flaw and Ukraine

San Francisco - A global wave of cyberattacks exploited an already patched vulnerability in Windows software and appeared to have Ukraine as a primary target, according to computer security specialists.

Britain's brand-new aircraft carrier 'runs Windows XP'

HMS Queen Elizabeth, the UK's new £3.5 billion aircraft carrier, reportedly uses Windows XP as its computer operating system. The flagship vessel left the dockyard for the first time this week. It quickly sailed into fears of a potential cyberattack risk

Pacemakers and other medical equipment vulnerable to hacking

We now live in a world where our very lives are tied into the technology we have created. From banking to defense systems, governments and medicine, every aspect of our lives are subject to software glitches and hacking, including pacemakers.

Hackers find way to hijack PCs using malicious subtitle files

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.

Improving email security against cyber attacks

A new study aims to help organizations improve email filters. This is based on analysis as to why phishing scams are successful and how computer systems can be better protected.

Pirated Windows copies helped to spread the WannaCry ransomware

The WannaCry ransomware that made its way around the globe last week may have been aided by the use of pirated Windows versions. According to security researchers, the widespread use of illegal copies gave it a foothold in some regions.

After massive cyberattacks, Microsoft criticizes U.S. government

Microsoft has criticised the US government following a massive ransomware cyberattack that hit computers around the world Friday, after it emerged that the malware made use of a software exploited developed by the NSA.

NHS hit by massive cyberattack, PCs are 'under their control'

The UK's National Health Service (NHS) has been targeted by hackers in a major cyberattack this afternoon. According to unconfirmed reports, the perpetrators have control of NHS computers. The organisation is diverting emergency patients away from A&E.

NATO sees sharp rise in state-backed cyber attacks: Stoltenberg

Berlin - NATO chief Jens Stoltenberg on Thursday said the alliance is coming under an increasing number of state-sponsored cyber attacks as he called on the bloc to boost its online defence capabilities.

Yahoo: 'State-sponsored' actors behind biggest data breach ever

Yahoo has said it believes "state-sponsored" actors were behind a massive data breach in 2013 that it only revealed today. The company said one billion user accounts could be affected. Customers have been advised to change all their passwords.

Carleton University computer system infected with ransomware

Ottawa - Carleton University confirmed that its IT network was attacked by ransomware, which is a virus that holds files hostage in exchange for payment.

Smart home devices weaponised to cause massive internet outage

Hackers hijacked internet-connected smart home devices including security cameras, printers and digital video recorders to mount the "massive and sustained" cyberattack on the Internet's infrastructure last week. Scores of websites were made inaccessible.

Mobile network flaw puts millions of phones at risk of hijacking

A flaw in code used by essential components of the world's telecoms infrastructure could allow cybercriminals to gain complete control of mobile networks and millions of smartphones. The bug is present across the industry and will never be fully patched.
  1 2 Next»

Set up a news alert for

Cyberattack


Cyberattack Image

Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down pa...
Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down parts of the internet last year
DAMIEN MEYER, AFP/File
Untitled
absentmindedprof
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentica...
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentication enabled
Pixabay / Pexels

Latest News
Top News