Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

RSA 2018 reveals the top five security themes

San Fransisco - The information technology and security community are bombarded with cyberattacks, and also regulations and a quantity of solutions that are difficult to decipher. The recent RSA conference revealed some solutions.

Twitter bug is a reminder that your data is vulnerable

This morning Twitter users opened their accounts to find a prompt asking them to change their password because of a bug in the system. Twitter Inc. is definitely not the only company to have a data protection incident this year, here are a few others.

New International Standard for information security

A revised standard for information security has been issued. This follows the changing landscape in relation to cybersecurity issues and the growing complexity of technology, which brings with it new vulnerabilities.

Russia blocks Telegram app over security concerns

Moscow - Russia has announced plans to block the use of the social media app Telegram over security concerns. This stems from the developers refusing to supply the encryption keys used to scramble messages.

Managing cybersecurity in the age of artificial intelligence

Regardless of if it's computational propaganda, or fake news and videos, or private data leaks, artificial intelligence has increasingly become a real global security challenge.

State of play: One year on from WannaCry ransomware outbreak

The one year anniversary of the WannaCry ransomware outbreak, which severely impacted global healthcare organizations, edges closer. A new report assess how well hospitals and healthcare facilities have respond in terms of new technology and systems.

How to stop cyberattacks on GPS-enabled devices

San Antonio - Technologists have devised a new technique designed to prevent cyberattacks on GPS-enabled devices. GPS, especially for utilities, remains one of the higher risk technologies in terms of cybersecurity.

IoT expansion could pose greater utilities threat

According to a new assessment, the adoption of Internet of Things technology raises the prospect of new and more imaginative cybersecurity threats, especially for utilities companies.

Cybersecurity skills lacking in the legal sector

According to a new assessment, while legal services are embracing new technologies the legal profession is lacking the necessary skills to ensure good cybersecurity practices are in place. Greater investment in resources is also required.

Were Blackberrys modified to help drug cartels?

Toronto - It appears that some Blackberry devices were modified to 'help drug cartels', according to U.S. authorities. The allegation is that Canadian company Phantom Secure sold modified Blackberry devices for illicit reasons.

Intel details plans for Meltdown and Spectre hardware protections

Intel has announced that its upcoming silicon architectures will include hardware fixes for the Meltdown and Spectre chip vulnerabilities. The company has redesigned parts of its processors to add "protective walls" between apps and malicious actors.

Google claims Android security 'leads the industry'

Google has published its fourth Android Security Review in which it details its progress in protecting ecosystem. The company is trying to address the perception that Android is less secure than iOS, claiming the two platforms now have security parity.

Prilex malware clones chip-and-pin payment cards

Cybercriminals have developed an effective way to clone chip-and-pin cards, according to research from Kaspersky Lab. The Prilex campaign has been active for over three years and is designed to subvert the latest protections introduced by card companies.

Microsoft patches 'critical' flaw in Windows' Remote Desktop

Microsoft has issued a preliminary fix for a serious vulnerability in Windows' Remote Desktop Protocol (RDP). An attacker could leverage the flaw to steal authentication details from a remote desktop session and gain control of a network domain.

Microsoft expands Windows Meltdown and Spectre patch availability

Microsoft has announced it is expanding its Meltdown and Spectre patches to a wider range of Windows PCs. In this month's Patch Tuesday security updates, the company delivered Intel's microcode updates to computers which were previously unprotected.

Slingshot malware campaign hid inside routers for six years

Security researchers have discovered a "highly sophisticated" malware which has been targeting Wi-Fi routers for over six years. It's thought Slingshot is the product of a state-sponsored cyberespionage campaign.

Cyberattacks using Microsoft PowerShell soar by over 400%

Microsoft's PowerShell scripting engine is becoming the target of choice for attackers looking to sneak exploits onto Windows systems. Research conducted by McAfee found the use of "fileless" hacking, using scripts instead of programs, is rapidly growing.

Microsoft prepares more changes to Windows 10 privacy setup

Microsoft's announced it's redesigning Windows 10's privacy screens again. The company is iterating on the experience introduced with the Windows 10 Creators Update, claiming it wants to help consumers make more "focused choices" on the use of their data.

Second shady company claims to have broken iPhone encryption

Two new cybersecurity companies have reportedly broken Apple's iPhone encryption and are selling unlocking services. Last week, Israeli U.S. firm Cellebrite said it had developed the tech. Another company is now also providing unlocking services.

Machine learning thwarted 'massive' Windows crypto-jacking attack

Microsoft has revealed that automated threat detection systems thwarted an enormous crypto-jacking malware campaign within 12 hours of its outbreak this week. The attack infiltrated 400,000 computers and used their processors to mine cryptocurrencies.

Microsoft calls for 'dialogue' on blockchain security issues

Microsoft has published a whitepaper that provides policy recommendations for dealing with blockchain security. The company said that regulators and industry should engage with each other to better understand the risks and align incentives to improve.

Fujitsu builds new tech to automate finding blockchain bugs

Fujitsu has announced new technology that can find and verify risks in blockchain applications. The tech analyses smart contracts to find potential flaws, providing advance warning of vulnerabilities. The company has identified six main risks.

Cisco expands Tetration analytics platform

Cisco has detailed changes coming to its Tetration data center analytics platform that will add additional cybersecurity tools and improved monitoring capabilities. Cisco is broadening the platform to provide visibility into entire datacentres.

GitHub suffers biggest ever DDoS, goes down for just 10 minutes

GitHub has reported a DDoS attack believed to be the biggest on record. Despite the scale, the company's infrastructure went offline for less than 10 minutes. The incident demonstrates the growing sophistication of both cyberattacks and cyber-defences.

Cyber criminals are exploiting the machine identity crisis

As the number and type of physical devices on enterprise networks continues to rise rapidly, so does the risk of cyberattack. Businesses need to strengthen security, according to a new report.

Equifax admits data breach impacted 2.4m more people

Equifax has confirmed that over 2.4m more people were affected by its data breach than the company originally reported. The new set of individuals suffered exposure of information including their names and driving license details.

Surveying the current IoT threat landscape: Interview Special

IoT security flaws are hitting the news at a higher rate, but what are the real risks? A leading expert explores the potential ‘worst-case scenario’ IoT attacks and provides best practice tips for enterprises and IoT service providers.

Cybersecurity challenges for financial servcies

Financial services are undergoing a revolution with new digital products and services. These services, which improve business performance and consumer experiences, are, however, prone to cyberattack.

Over half of medium-sized businesses breached in 2017

Over half of IT professionals in U.S. medium-sized businesses believe their organisation was breached in 2017. A report from security firm Cygilant found companies are ill-equipped to respond to breaches and just 15% are "confident" in their strategies.

Improving security with real-time Captcha

A real-time Captcha technique can improve biometric authentication, according to new technology research. This helps to combat hackers who try to use machine learning and image generation software in order to fool legitimate users.
  1 2 3 4 5 6 ... 11 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
Untitled
Photo by Thought Catalog
Untitled
Loic Venance, AFP
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Critics say the GDPR could take away an important tool used by law enforcement  security researchers...
Critics say the GDPR could take away an important tool used by law enforcement, security researchers, journalists and others.
Thomas Samson, AFP/File
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
A hacker in action.
A hacker in action.
Davide Restivo
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA

Latest News
Top News