Email
Password
Remember meForgot password?
    Log in with Twitter

Cyberattack News

New International Standard for information security

A revised standard for information security has been issued. This follows the changing landscape in relation to cybersecurity issues and the growing complexity of technology, which brings with it new vulnerabilities.

Interview: How businesses can safeguard their digital processes Special

Vulnerabilities exist in critical utilities infrastructures and the number of reported attacks grows. How can those who operate critical infrastructures best defend against such attacks? Security expert Stewart Kantor provides some answers.

How to stop cyberattacks on GPS-enabled devices

San Antonio - Technologists have devised a new technique designed to prevent cyberattacks on GPS-enabled devices. GPS, especially for utilities, remains one of the higher risk technologies in terms of cybersecurity.

GitHub suffers biggest ever DDoS, goes down for just 10 minutes

GitHub has reported a DDoS attack believed to be the biggest on record. Despite the scale, the company's infrastructure went offline for less than 10 minutes. The incident demonstrates the growing sophistication of both cyberattacks and cyber-defences.

Thieves stole over 600 Bitcoin miners from Icelandic datacentre

Police in Iceland have arrested 11 people in connection with the theft of Bitcoin mining equipment worth almost $2m. The suspects allegedly stole hundreds of computers during four datacentre raids. The incident has been dubbed the "Big Bitcoin Heist."

Cyber criminals are exploiting the machine identity crisis

As the number and type of physical devices on enterprise networks continues to rise rapidly, so does the risk of cyberattack. Businesses need to strengthen security, according to a new report.

Equifax admits data breach impacted 2.4m more people

Equifax has confirmed that over 2.4m more people were affected by its data breach than the company originally reported. The new set of individuals suffered exposure of information including their names and driving license details.

Cybersecurity challenges for financial servcies

Financial services are undergoing a revolution with new digital products and services. These services, which improve business performance and consumer experiences, are, however, prone to cyberattack.

Mobile health applications have security risks

A new report suggests that many types of mobile health applications are putting the personal data of millions of users at risk, due to security vulnerabilities.

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

As Internet of Things technology expands do security risks rise?

For many businesses in 2018, Internet of Things technology will play a major part. A significant increase in spend and different technology types is predicted in a new report. However, does expansion bring more security concerns?

Cybersecurity trends for 2018

This year's big technology headlines have focused on cybersecurity and the range of businesses affected by cyberattacks. To help protect businesses in 2018, cybersecurity service firm Zenedge provides answers.

Making cybersecurity stronger in harsh environments

Remaining protected from cyber attacks is diffiucult at the best of times. It is more challenging in extreme environments, such as a war zone. New research offers some solutions.

Botnet of 100,000 routers could unleash cyberattack at any moment

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Android cyberattack combines phishing and data theft

Cybercriminals have combined three techniques into a single campaign, creating an attack that can steal credentials, phish credit cards and install bank Trojans. Based on an "increasingly sophisticated" form of malware, it targeted Austrian bank users.

Interview: Joe Stuntz on cybersecurity and One World Identity Special

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

Deloitte suffered silent data breach it took six months to find

Deloitte has confirmed a data breach allowed attackers to steal confidential client emails. The incident went unnoticed for months and only became public knowledge after a Guardian report today. It was caused by a basic email security lapse.

CCleaner malware might have been designed to steal trade secrets

The malware found bundled with popular computer maintenance software CCleaner was designed to compromise machines at some of the world's biggest tech companies. The discovery suggests the attack was more significant than first thought.

New cybersecurity solution for small businesses

CYBONET, the international information security solutions provider based in Israel, has a new initiative Cybowall, which is a threat detection and response platform designed for SMEs.

8 billion Bluetooth devices at risk of attack

Security researchers have discovered a flaw in Bluetooth that leaves almost every Bluetooth-enabled device vulnerable. It gives the attacker the ability to run malicious code. It's an example of what could go wrong with the Internet of Things.

Cyberattack leaves millions without mobile phone service in Venezuela

Caracas - A massive cyberattack that took down government websites in Venezuela earlier this week also has left seven million mobile phone users without service, the government said Thursday.

Digital health users need to be mindful of security risk

The transition of more and more health information into a digital format can lead to many benefits, especially in terms of the speed of analysis. It can also present risks, in terms of cybersecurity. Risks are highlighted in a new report.

Cyberattacks: What businesses can do

The threat from the destructive piece of ransomware, dubbed WannaCry, has dissipated, but this doesn’t mean businesses are no longer vulnerable to attack. We take stock of the best advice for businesses.

WikiLeaks reveals CIA malware for hacking Linux computers

The CIA has developed strains of malware specifically designed to target Linux computers. The existence of the malware, known as OutlawCountry, was revealed by WikiLeaks. It demonstrates the CIA is intent on accessing all kinds of computer system.

'Ransomware' wave seemed aimed at old flaw and Ukraine

San Francisco - A global wave of cyberattacks exploited an already patched vulnerability in Windows software and appeared to have Ukraine as a primary target, according to computer security specialists.

Britain's brand-new aircraft carrier 'runs Windows XP'

HMS Queen Elizabeth, the UK's new £3.5 billion aircraft carrier, reportedly uses Windows XP as its computer operating system. The flagship vessel left the dockyard for the first time this week. It quickly sailed into fears of a potential cyberattack risk

Pacemakers and other medical equipment vulnerable to hacking

We now live in a world where our very lives are tied into the technology we have created. From banking to defense systems, governments and medicine, every aspect of our lives are subject to software glitches and hacking, including pacemakers.

Hackers find way to hijack PCs using malicious subtitle files

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.
  1 2 3 Next»

Set up a news alert for

Cyberattack


Cyberattack Image

Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down pa...
Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down parts of the internet last year
DAMIEN MEYER, AFP/File
Untitled
absentmindedprof
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentica...
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentication enabled
Pixabay / Pexels