Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Nokia: Android smartphones biggest malware target in 2017

Android smartphones accounted for the majority of malware attacks over the past year, behind devices running Windows. The figures come from Nokia's Threat Intelligence Lab which warned more needs to be done to keep mobile users secure.

Google's Pixel 2 has a dedicated security chip to keep data safe

Google's detailed how the "tamper-resistant" security chip inside the Pixel 2 helps keep enterprise users secure. The chip is a first for Android and helps the device verify it's being used by its real owner. Google said it puts security "at the core."

AI chatbot used to combat phishing by wasting scammers' time

A team of cybersecurity researchers has developed an AI chatbot that aims to waste scammers' time by responding to phishing emails. You can forward scam emails to the bot. A proxy email address will then start automatically replying the scammer for you.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Google says phishing attacks are the biggest risk to web users

A Google study has found phishing attacks crafted by scammers are a far bigger threat than keyloggers and reusing passwords. Thieves obtain over 250,000 valid sets of credentials for Gmail accounts each week, illustrating the scale of the problem.

25% of small firms 'doing nothing' to defend against cyberthreats

Most small business owners feel "underprepared" to deal with cybersecurity threats, according to a study of digital trends published today. 25% of firms said they feel they're "doing nothing" to keep data secure, although digital adoption is growing.

Android cyberattack combines phishing and data theft

Cybercriminals have combined three techniques into a single campaign, creating an attack that can steal credentials, phish credit cards and install bank Trojans. Based on an "increasingly sophisticated" form of malware, it targeted Austrian bank users.

New Internet browser security warning

A new study has found so-termed 'boated browser functionality' (rarely used functionality) presents unnecessary security and privacy risks to users.

Dell loses control of important domain name to cybersquatters

Dell has suffered an embarrassing cybersecurity incident after it forgot to renew a domain name used by one of its services. Squatters had control of the domain for a month. It's thought it may have been used to distribute malware before Dell regained it.

Bug in Google bug tracker let hackers exploit unpatched issues

A bug in Google's bug tracking platform allowed external users to view all the issues in the system. The flaw could have allowed attackers to silently monitor unpatched vulnerabilities to exploit them in the wild before fixes were released.

Apple locked in differential privacy debate

A new data collection technique being used by firms including Apple could let companies collect app use information while protecting your identity. Differential privacy adds "noise" to data harvested from your device, preventing it from being traced back.

Interview: Joe Stuntz on cybersecurity and One World Identity Special

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

Bad Rabbit ransomware spreads around globe as Adobe flash update

A new ransomware campaign that began on Tuesday in Russia and Ukraine is now on the move, spreading through a number of countries. Dubbed "Bad Rabbit," it poses as an Adobe Flash update.

Hackers targeting NATO and U.S. military cyber-experts

Hackers backed by the military intelligence agency of Russia are apparently targeting security researchers with their latest campaign, which uses a document advertising a cybersecurity conference in Washington D.C. as the lure.

Essential Science: Improving voice control security

University of Michigan researchers have devised new means for enhancing the security of voice activated software. The aim is to eliminate the vulnerabilities associated with voice authentication.

Interview: How secure is blockchain technology? Special

Blockchain and Distributed Ledger Technology (DLT) adoption is growing rapidly, but are these blockchain and ledger technologies secure? We spoke with Dr. Leemon Baird, founder and CTO of Swirlds to find out more.

Ransomware-spreading botnet takes desktop screenshots

The Necurs botnet has been inactive for much of the first half of 2017, but it is now back, with a vengeance. Recently, Millions of malicious emails have been distributed, with most of them spreading Locky ransomware.

Google launches hardened security options for at-risk users

Google has announced several new account security options aimed at consumers at particular risk of cyberattack. The company's Advanced Protection program offers extended protections to prevent phishing attacks and safeguard data for at-risk users.

Homeland Security forces federal agencies to secure their emails

The U.S. Department of Homeland Security has announced that federal agencies must improve their cybersecurity within the next 90 days. The decision, praised by the Global Cyber Appliance, will force agencies to use HTTPS and secure email accounts.

IRS suspends Equifax 'Taxpayer Identity' contract during review

Atlanta - An Equifax spokesperson confirmed on Friday the Internal Revenue Service (IRS) had issued a stop-work order for the short-term "Transaction Support for Identity Management contract."

Equifax website has been hacked again with fake Flash update

Equifax, the credit rating reporting agency that exposed personal data of nearly 150 million people, (and recently was awarded a contract by the IRS to confirm taxpayer's identities), appears to have been hacked — again.

Technology sector growth bucks national trend, adding more jobs

The U.S. information technology (IT) sector added an estimated 3,200 new jobs in September, despite employment slowdowns in other areas of the economy, according to an analysis by CompTIA, the world's leading technology association.

Facial recognition technology needs to know your age

Nanded - To be really effective the use of facial recognition technology needs to be able to assess the age of the person access a computer system. A new approach for machine learning and age assessment has been announced.

New cybersecruity vulnerability with fitness monitors

Edinburgh - A new study of the security vulnerabilities of fitness trackers signals that the health technology sector needs to go further in building safeguards to protect the data of users of fitness devices. The study focuses on Fitbits.

Goodbye login, hello heart scan

Are fingerprints a reliable biometric tool? To overcome potential security flaws researchers are looking to the feasibility of using heart scans for added computer systems security.

Gmail to rollout physical security option for executive users

Google will soon launch upgraded security options for better protection, according to a recent report. The company is boosting the email protections used to keep sensitive data safe. The changes target executives and politicians and include physical keys.

Web security upgrade delayed over fears 60m could lose connection

A major security upgrade to infrastructure that supports the entire Internet has been delayed over fears it could knock 60 million people offline. ICANN was preparing to change cryptographic keys to boost security but has put the plans on hold until 2018.

Lev Lesokhin discusses CAST's system-level analysis platform Special

The massive data breach disclosed by Equifax earlier this month has created more questions than answers, leading many businesses to reassess their own data security measures.

Microsoft: 80% of people risk data by using unsafe apps at work

80 percent of company employees use unapproved apps at work, potentially putting business data at risk. The figure, reported by Microsoft, reveals individuals should not be trusted to manage their own data. Instead, a more proactive approach is required.

Deloitte suffered silent data breach it took six months to find

Deloitte has confirmed a data breach allowed attackers to steal confidential client emails. The incident went unnoticed for months and only became public knowledge after a Guardian report today. It was caused by a basic email security lapse.
  1 2 3 4 5 6 ... 9 Next»

Set up a news alert for


Cybersecurity Image

This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
By Dwight Burdette (Own work) [CC-BY-3.0 (], via Wikimedi
Bay Dynamics
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
A hacker in action.
A hacker in action.
Davide Restivo
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password

Latest News
Top News