Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

'No More Ransom' helps you recover data after a malware attack

A new website set up by Europol, Intel and Kaspersky to help resist the threat of ransomware could allow you to recover encrypted data for free. The site is designed to stop people paying ransoms to malware creators as this makes the problem worse.

Microsoft patches 20-year-old critical Windows printing bug

Microsoft has patched a major flaw in all supported versions of Windows that allows hackers to install malware on your computer through the system print spooler. The vulnerability could give attackers an easy way to infect devices connected to a network.

Latest ransomware permanently deletes files, even if you pay

Ransomware is a rapidly growing form of malware and is proving greatly effective. Not every piece of ransomware is the same though, as one recent discovery proved. A new scam circulating online leaves out the encryption, simply deleting all your files.

Chrome bug lets you download full Netflix movies for free

A recently discovered bug in Google's Chrome web browser makes it possible for anyone to download full movies from DRM-protected sources including Netflix and Amazon. Pirates could easily bypass Chrome's copy protection systems to access content.

Apple sets a mystery, releases iOS 10 without an encrypted core

Last week, Apple released a developer's preview of iOS 10, the latest update to its ubiquitous mobile operating system. Researchers have since discovered the kernel has been left unencrypted, allowing developers to investigate what lies in the core.

Maryland hospital hacked with ransomware, FBI suspects inside job

Baltimore - A Samsam ransomware virus infected the MedStar Web server of the Baltimore's Union Memorial Hospital, in Maryland. The malware has been launched from within, according to the Federal Bureau of Investigation (FBI) reports.

Passwords aren't going anywhere yet, should last until 2025

Despite moves towards two-factor and biometric authentication methods, the humble password remains the most common form of protection used online. The often-loathed strings of characters won't be phased out for another 10 years, according to a study.

CISA: 10 things you need to know about new cybersecurity law

San Francisco - Last month, the United States Senate overwhelmingly approved the Cybersecurity Information Sharing Act (CISA), a controversial measure critics argue will allow the government to collect sensitive personal data unchecked.

Report: Websites can identify you just by analysing how you type

A recent report has found that websites can track their users by doing nothing more than analysing keystrokes made during typing. It follows previous similar discoveries such as tracking using no other factor than the remaining battery on a device.

Mozilla to beef-up Firefox private browsing capability

Mozilla, the open source software firm, announced that it is testing a new tool to facilitate private browsing on its Firefox browser.

FBI understaffed to ward off cybersecurity attacks, report says

The Next Generation Cyber Initiative is meant to step up investigation of cyber crimes, but the FBI is having trouble attracting computer scientists and cooperation from the private sector, according to an independent study.

Affair site AshleyMadison hacked; worse online threats loom

AshleyMadison confirmed hackers accessed the company's adulterer database, but has managed to remove leaked information. Government and business leaders are unprepared for even greater cybersecurity threats in the future, security experts say.

Millennials most vulnerable to hacking, cyberattacks, says study

While teens and young adults are usually thought to be more tech savvy then middle-aged adults, new research suggests millennials are more lackadaisical about being safe online.

China blames foreign malware for Internet outage

China has blamed malware originating from "overseas servers" for causing a widespread Internet outage in the country last weekend. The unusual attack resulted in several users being redirected to one of two websites when browsing online.

'Joke Tweet' gets cybersecurity expert barred from United flight

A prominent cybersecurity researcher ran afoul of United Airlines last week after he joked on Twitter that the airline's onboard computer systems could be hacked. The airline was not amused.

Russia hacked the White House, accessed the President's schedule

The same Russian hackers that recently damaged the State Department hacked into sensitive parts of the White House managed to access information including details of the president's schedule, according to a new report.

Op-Ed: Privacy is not dead, it is crowd-sourced

Which is the biggest threat to privacy: spying or sharing? Outrage at government programs may miss the real culprit responsible for killing privacy as we once knew it.

Op-Ed: Canadian spy agency collects Canadian emails to government sites

Ottawa - Canada's Communications Security Establishment(CSE) is collecting millions of emails sent by Canadians to government sites on the Internet. The collected emails are searched for malware that could attack government computer networks.

Russian cybersecurity firm reports U.S. embedded spyware

San Francisco - A Russian Cybersecurity firm reported on Monday that the United States permanently embedded sabotage tools and software in targeted networks globally.

Obama signs executive order at Stanford cybersecurity summit Special

Palo Alto - President Barack Obama signed an executive order laying out new ways for corporations to share information on emerging online threats at a cybersecurity summit at California's Stanford University.

Academic researcher publishes 10 million usernames and passwords

A security analyst and hacking author just published 10 million web usernames and passwords in the name of academic research.

Cyber security predictions for 2015

Each year various cyber security experts provide their predictions about the immediate future of network and information security in the hopes that people can plan and prepare a little more effectively.

Obama calls for new laws to increase cybersecurity

Washington - Citing recent cyber attacks against the Pentagon and Sony Pictures Entertainment, President Barack Obama on Tuesday called on Congress to pass sweeping legislation aimed at boosting US cybersecurity.

David Cameron wants to ban encryption

In the aftermath of the Charlie Hebdo shootings in Paris, David Cameron has announced plans to introduce significant new surveillance powers in the UK, the Independent is reporting.

Op-Ed: Addressing security holes, vulnerabilities and mitigation tactics

The year 2014 has been characterized as problematic due to a fairly rising number of cyber-attacks, data breaches and incidents around security vulnerabilities.

Energy services providers driving innovation and change Special

Washington - Charting changes in energy storage, this reporter recently met with the managements of 3 rapidly emerging energy storage technology services providers to learn about their fierce pace for driving change in the electric utility industries.

Review: A chat with Brook Zimmatore on Cyber security efforts in the EU Special

In spite of the economic woes that plagues the Eurozone, much of the attention has been placed on the exercise the Cyber Europe 2014.

Op-Ed: UK banking cyber-attack test draws attention

During the last few years, there has been increase in security issues affecting stock markets and investors. Cyber criminals now pose a larger threat to corporate and personal information.

On mounting privacy concerns, WhatsApp CEO defends acquisition

As the FTC begins reviewing the results of Facebook's proposed WhatsApp acquisition, WhatsApp CEO Jan Koum claimed privacy concerns in the resulting acquisition are "inaccurate and careless."

Op-Ed: Is Target responsible for the major cyberattack?

Target has been named as a defendant in over 90 lawsuits with plaintiffs ranging from banks to customers. The plaintiffs are citing negligence on the part of the big box retail giant and are seeking various amounts in compensatory damages.
  1 2 3 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

A hacker in action.
A hacker in action.
Davide Restivo
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR