Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Britain's brand-new aircraft carrier 'runs Windows XP'

HMS Queen Elizabeth, the UK's new £3.5 billion aircraft carrier, reportedly uses Windows XP as its computer operating system. The flagship vessel left the dockyard for the first time this week. It quickly sailed into fears of a potential cyberattack risk

Using machine learning to detect fake on-line profiles

Edinburgh - The era of ‘fake news’ extends to ‘fake profiles’ on social media designed for the spreading of misinformation, as well as being used for criminal activities. A new computer program shows success in spotting these.

European Union mulls making end-to-end encryption mandatory

The European Parliament has proposed that end-to-end encryption should be used to protect all forms of online communication. The legislation would outlaw "backdoors" in software and seek to extend the digital privacy rights of EU citizens.

Global ransomware attack 'came from North Korea'

London - May 2017's global ransomware attack, which struck over 200,000 computer systems across 150 countries, was 'launched from North Korea' according to British security officials.

Windows XP updated to defend against 'nation-state' cyberattacks

Microsoft has taken the highly unusual step of releasing a new set of Windows security updates for unsupported operating system versions. The company said the patches come in the wake of WannaCrypt and provide protection against "nation-state actors."

Random number generation poses hacker challenge

The best way to protect sensitive systems from hackers is to use a cryptographic key. For this lock to work it needs to use numbers chosen at random without any structure. This is difficult but a new system is at hand.

Researchers warn Mac computer users to watch for new ransomware

Security researchers have warned that two dangerous new strains of malware have been spotted online, including a ransomware attack. It specifically targets Apple Mac computers, making it one of very few campaigns to stray away from Windows.

Microsoft's Cloud is attacked 1.5 million times every day

Microsoft has revealed its automated cloud protection mechanisms foil over 1.5 million attacks on its online services every day. The service-centric company has robust systems that help to keep user data on products like Office 365 and Outlook secure.

Malware infecting 250 million devices could be a 'catastrophe'

An invasive form of malware believed to be attached to a Chinese firm could spell "global catastrophe," according to the cybersecurity firm that discovered it. The software has the power to gain near-complete control of targets, including spying on files.

OneLogin password manager breached, user data decrypted

Popular password management service OneLogin has reported a serious breach of its security systems which may have allowed attackers to access user data. The company told its customers that the perpetrators could have decrypted stored passwords.

Google Chrome bug lets sites secretly record from your webcam

A bug in Google Chrome could allow malicious webpages to surreptitiously record video without your knowledge. The warning comes from a security researcher who discovered a way to bypass Chrome's usual indication that a recording is active.

Internet Archive 'carbon dated' using Bitcoin technology

The entire Internet has been timestamped using a cryptographic technique based on the blockchain technology that characterises digital cryptocurrencies like Bitcoin. The work allows Bitcoin timestamps to be downloaded for almost any online content.

Hackers find way to hijack PCs using malicious subtitle files

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.

Improving email security against cyber attacks

A new study aims to help organizations improve email filters. This is based on analysis as to why phishing scams are successful and how computer systems can be better protected.

Samsung's Galaxy S8 iris scanner fooled by a photograph

Samsung's "ultrasecure" iris scanner on its Galaxy S8 smartphone has been fooled using a photograph and contact lens. The method is alarmingly trivial to use and raises concerns about the safety of the biometric authentication technique.

Bank's voice recognition system fooled by user's twin

The voice recognition security system used by a major UK bank was compromised in a test by a user's twin. The breach allows recent transactions to be displayed and money to be transferred between accounts. Withdrawals are not permitted.

Mar-a-Lago, other Trump properties easy targets to hack: report

An investigation has determined the Internet security at Mar-a-Lago and other Donald J. Trump’s properties is extremely weak. Three investigators determined the Wi-Fi systems of these properties could be hacked into in about five minutes.

What you need to know about ransomware

A spate of fast-moving wave of cyber attacks have swept the globe, using a form of ransomware. This malicious software has infiltrated a number of IT systems, including that of the English National health Service We take a look at the virus.

NHS hit by massive cyberattack, PCs are 'under their control'

The UK's National Health Service (NHS) has been targeted by hackers in a major cyberattack this afternoon. According to unconfirmed reports, the perpetrators have control of NHS computers. The organisation is diverting emergency patients away from A&E.

Researchers create AI to help you choose stronger passwords

Cybersecurity researchers have created a new password strength meter that provides actionable tips informing you how to create safer passwords. Backed by artificial intelligence and new algorithms, the team wants to help people make better choices.

Cell phones charging are at greatest risk from hackers

Cell phones, as with websites and other forms of communications equipment, are at risk from hacking. A major vulnerability arises with smartphones when they are charging, according to a new study from the New York Institute of Technology.

Intel releases fix for critical CPU flaw found after a decade

Intel has released a patch for a major issue in many of its vPro processors used in business computers. The flaw has been present in devices for over ten years and gives an attacker the ability to remotely execute code, gaining control of the PC.

Noiszy interview: How a browser plugin masks your digital tracks Special

Noiszy is a new browser plugin that masks your tracks with digital noise. It's one of a new breed of tools that let you resist online tracking and break the filter bubble. In this interview, its creator speaks to Digital Journal about the need for Noiszy.

'Vigilante' worm fights Mirai botnet for control of your devices

A new worm is rapidly spreading across the Internet in search of vulnerable smart home appliances. Curiously, it's believed its author is a vigilante white-hat hacker, aiming to fend off the dangerous Mirai botnet that's coordinating IoT attacks.

Mastodon is an open alternative to Twitter

Mastodon is a rapidly growing social network that's like a more open, less abusive version of Twitter. Open-source and decentralised, Mastodon gives you a say over how your data is used. It takes away the algorithms and returns to simple chronology.

Microsoft patched Windows flaws in new NSA leaks back in March

Microsoft has said it patched Windows flaws allegedly exploited by the NSA in an update in March, before they were leaked. The company has not disclosed who alerted it to the issues in an unusual move that's added to the mystery.

Digital noise: How a new web plugin hides your footsteps online

A recently-launched browser plugin has introduced a new way to resist online tracking by creating "digital noise." Noiszy decreases the value of data collected by ISPs and advertisers by masking your activities with a "flood" of auto-generated web visits.

The way you tilt your phone could let hackers steal your PIN

Cybercriminals can calculate smartphone passwords and PINs by monitoring the ways in which devices are held. The warning comes from a group of security researchers who claim 70 percent of four-digit PIN codes can be identified after just one attempt.

Microsoft to patch Office exploit that allows code execution

Hackers have been caught using compromised Microsoft Word files to install malware on target computers. The flaw, yet to be patched by Microsoft, is in active use in the wild and can be used to silently run code and download executable files.

Malware made by the NSA released by Shadow Brokers group

Malware allegedly built by the U.S. National Security Agency (NSA) has been released online by hacking group Shadow Brokers. The tools have been confirmed to be authentic by cybersecurity experts but some of the software seems to be dated.
  1 2 3 4 5 6 ... 7 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
A hacker in action.
A hacker in action.
Davide Restivo
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File

Latest News
Top News