Remember meForgot password?
    Log in with Twitter

Cyberattack News

Why time matters when dealing with cyber threats

IT professionals are engaged in a continuous arms race with threat actors. In relation to vulnerabilities, this arms race is between attackers' access to exploits and defenders' ability to assess, remediate and mitigate them.

BlackBerry bounces back as a cybersecurity consultancy

BlackBerry may still be associated with the first wave of smartphones, However the Canadian company has had more success recently with system security services and products.

Q&A: Cybersecurity solutions for data migration Special

As companies are undergoing digital transformation, many are inadvertently leaving themselves open to cyberattacks, according to Eitan Bremler, Co-Founder and VP of Product at Safe-T.

Huazhu Hotels investigating potential loss of guest data

A leading Chinese hotel group - Huazhu Hotels - is investigating a serious leak of millions of guests' data. This follows millions of its customers' records appearing for sale on the Internet.

Q&A: Why cybersecurity needs to be part of digital transformation Special

To advance with digital transformation, a robust approach cybersecurity is needed. This goes hand-in-hand with company strategy as more firms go down the DX path. Jumio Head of Global Marketing Dean Nicolls provides some insights.

Q&A: Insights into recent global malware attacks Special

Stealing data, credentials, payment information, etc. is a recurring theme in the realm of cybercrime, and much of it is the result of malware. As globalware attacks surpass 9 billion, cyber threats are dominating many business priorities.

Surveying international malware threats: Q&A Special

Malware attacks have caused major damage over the years to businesses. Threats include viruses, worms, Trojan horses and ransomware. Many of the perpetrators are hidden behind a veil of Internet anonymity. Douglas Crawford, of explains more.

Q&A: Cybersecurity risks associated with the smart home Special

Cybersecurity expert Alex Vaystikh recently bought a new dishwasher before realizing that it connects to his Wi-fi to download updates. In an exclusive interview with Digital Journal, Vaystikh expands on smart home risks.

AI has the potential to reduce cyberattacks: Interview Special

As data becomes more pervasive and more accessible, cybersecurity and privacy concerns continue to be on the rise as well. Can AI can continue to advance without risking highly personal and valuable information? Dan Baird of Wrench.AI shares his views.

Insider threats are inherent to every organization

All businesses are at risk from cyberattacks. While much attention is focused externally, a considerable risk exists internally, as new report from LogRhythm indicates.

Q&A: Why businesses still face cyber risks Special

Vertek Research recently uncovered a leak that exposed over 43 million email addresses to a massive spamming campaign. Why are businesses still vulnerable to this type of attack and what can be done to protect them?

Why businesses need extra vigilance to combat phishing attacks

New research shows how today's email system has no mechanism to fully prevent spoofing. This means extra vigilance required on the part of businesses in order to combat growing sophistication of phishing attacks.

New International Standard for information security

A revised standard for information security has been issued. This follows the changing landscape in relation to cybersecurity issues and the growing complexity of technology, which brings with it new vulnerabilities.

Interview: How businesses can safeguard their digital processes Special

Vulnerabilities exist in critical utilities infrastructures and the number of reported attacks grows. How can those who operate critical infrastructures best defend against such attacks? Security expert Stewart Kantor provides some answers.

How to stop cyberattacks on GPS-enabled devices

San Antonio - Technologists have devised a new technique designed to prevent cyberattacks on GPS-enabled devices. GPS, especially for utilities, remains one of the higher risk technologies in terms of cybersecurity.

GitHub suffers biggest ever DDoS, goes down for just 10 minutes

GitHub has reported a DDoS attack believed to be the biggest on record. Despite the scale, the company's infrastructure went offline for less than 10 minutes. The incident demonstrates the growing sophistication of both cyberattacks and cyber-defences.

Thieves stole over 600 Bitcoin miners from Icelandic datacentre

Police in Iceland have arrested 11 people in connection with the theft of Bitcoin mining equipment worth almost $2m. The suspects allegedly stole hundreds of computers during four datacentre raids. The incident has been dubbed the "Big Bitcoin Heist."

Cyber criminals are exploiting the machine identity crisis

As the number and type of physical devices on enterprise networks continues to rise rapidly, so does the risk of cyberattack. Businesses need to strengthen security, according to a new report.

Equifax admits data breach impacted 2.4m more people

Equifax has confirmed that over 2.4m more people were affected by its data breach than the company originally reported. The new set of individuals suffered exposure of information including their names and driving license details.

Cybersecurity challenges for financial servcies

Financial services are undergoing a revolution with new digital products and services. These services, which improve business performance and consumer experiences, are, however, prone to cyberattack.

Mobile health applications have security risks

A new report suggests that many types of mobile health applications are putting the personal data of millions of users at risk, due to security vulnerabilities.

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

As Internet of Things technology expands do security risks rise?

For many businesses in 2018, Internet of Things technology will play a major part. A significant increase in spend and different technology types is predicted in a new report. However, does expansion bring more security concerns?

Cybersecurity trends for 2018

This year's big technology headlines have focused on cybersecurity and the range of businesses affected by cyberattacks. To help protect businesses in 2018, cybersecurity service firm Zenedge provides answers.

Making cybersecurity stronger in harsh environments

Remaining protected from cyber attacks is diffiucult at the best of times. It is more challenging in extreme environments, such as a war zone. New research offers some solutions.

Botnet of 100,000 routers could unleash cyberattack at any moment

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Android cyberattack combines phishing and data theft

Cybercriminals have combined three techniques into a single campaign, creating an attack that can steal credentials, phish credit cards and install bank Trojans. Based on an "increasingly sophisticated" form of malware, it targeted Austrian bank users.

Interview: Joe Stuntz on cybersecurity and One World Identity Special

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.
  1 2 3 Next»

Set up a news alert for


Cyberattack Image

Deloitte confirmed a data breach caused by an email admin account left without two-factor authentica...
Deloitte confirmed a data breach caused by an email admin account left without two-factor authentication enabled
Pixabay / Pexels
Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down pa...
Three men have pleaded guilty to US charges stemming from the Mirai botnet attacks that shut down parts of the internet last year