Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Shipping industry at risk of cyberattacks by hackers and pirates

Hackers are increasingly targeting shipping firms to extract business information, attempt audacious frauds and steal goods from vessels. Members of the security industry warned shipping firms are often unaware of the dangers.

Over half of Windows 7 PCs have no antivirus installed

Microsoft's latest security report contains several interesting statistics on Windows antivirus usage. Over half of all PCs running Windows 7 have no antivirus software installed or have it turned off. The situation's not much better on newer versions.

Microsoft sees cyberattacks as part of the 'fabric of society'

Microsoft has warned that artificial intelligence could "reset" cybercrime and the techniques used to combat it. AI is being used to tackle emerging threats but is also powering a new generation of malware created by elite attackers.

Obama's cybersecurity advisor: We need to tackle 'statecraft'

Obama's former cyber advisor Michael Daniel has said we need to reconsider our approach to cybersecurity. He called for more companies to share information about common threats as states and governments step up their use of cyberattacks.

Digital health users need to be mindful of security risk

The transition of more and more health information into a digital format can lead to many benefits, especially in terms of the speed of analysis. It can also present risks, in terms of cybersecurity. Risks are highlighted in a new report.

Cyberattacks: What businesses can do

The threat from the destructive piece of ransomware, dubbed WannaCry, has dissipated, but this doesn’t mean businesses are no longer vulnerable to attack. We take stock of the best advice for businesses.

Cybersecurity is a $81.7 billion market — startups raking it in

Last year, investors put $3.5 billion into cybersecurity companies via more than 400 deals, according to CB Insights. And those numbers may well go up this year — the first quarter of 2017 set a five-year record for deals in the private security space.

Your next smart device might come with a 'security rating'

As the Internet of Things proliferates, keeping scores of connected devices secure is going to present a challenge. Since most users don't understand the risks, some experts are proposing devices get a "security score," similar to an energy rating.

Apple to open data center in China to comply with government regs

Beijing - Apple is building a new data center in China in order to comply with the country's new cyber-security laws passed last year that require companies to store customer data on servers located in China.

CIA-hired hackers could make up to $150k a year

Hackers hired by the CIA and other government agencies could be making up to $150,000 per year. The pay for top-level engineers is higher and scales up to $200,000. A range of bonuses are available too, aiming to keep developers locked in.

John McAfee and Intel agree to settle lawsuit over his name

John McAfee has settled his lawsuit with Intel over the rights to use his name for his new company. McAfee sold his well-known antivirus firm to Intel six years ago. He started a lawsuit last year to regain the rights to use "McAfee" at his current firm.

One of the busiest bitcoin exchanges has been hacked

One of the largest bitcoin exchanges in the world has been hacked, and 30,000 customers' data has been compromised, according to a report from Yonhap News.

WikiLeaks reveals CIA malware for hacking Linux computers

The CIA has developed strains of malware specifically designed to target Linux computers. The existence of the malware, known as OutlawCountry, was revealed by WikiLeaks. It demonstrates the CIA is intent on accessing all kinds of computer system.

Britain's brand-new aircraft carrier 'runs Windows XP'

HMS Queen Elizabeth, the UK's new £3.5 billion aircraft carrier, reportedly uses Windows XP as its computer operating system. The flagship vessel left the dockyard for the first time this week. It quickly sailed into fears of a potential cyberattack risk

Using machine learning to detect fake on-line profiles

Edinburgh - The era of ‘fake news’ extends to ‘fake profiles’ on social media designed for the spreading of misinformation, as well as being used for criminal activities. A new computer program shows success in spotting these.

European Union mulls making end-to-end encryption mandatory

The European Parliament has proposed that end-to-end encryption should be used to protect all forms of online communication. The legislation would outlaw "backdoors" in software and seek to extend the digital privacy rights of EU citizens.

Global ransomware attack 'came from North Korea'

London - May 2017's global ransomware attack, which struck over 200,000 computer systems across 150 countries, was 'launched from North Korea' according to British security officials.

Windows XP updated to defend against 'nation-state' cyberattacks

Microsoft has taken the highly unusual step of releasing a new set of Windows security updates for unsupported operating system versions. The company said the patches come in the wake of WannaCrypt and provide protection against "nation-state actors."

Random number generation poses hacker challenge

The best way to protect sensitive systems from hackers is to use a cryptographic key. For this lock to work it needs to use numbers chosen at random without any structure. This is difficult but a new system is at hand.

Researchers warn Mac computer users to watch for new ransomware

Security researchers have warned that two dangerous new strains of malware have been spotted online, including a ransomware attack. It specifically targets Apple Mac computers, making it one of very few campaigns to stray away from Windows.

Microsoft's Cloud is attacked 1.5 million times every day

Microsoft has revealed its automated cloud protection mechanisms foil over 1.5 million attacks on its online services every day. The service-centric company has robust systems that help to keep user data on products like Office 365 and Outlook secure.

Malware infecting 250 million devices could be a 'catastrophe'

An invasive form of malware believed to be attached to a Chinese firm could spell "global catastrophe," according to the cybersecurity firm that discovered it. The software has the power to gain near-complete control of targets, including spying on files.

OneLogin password manager breached, user data decrypted

Popular password management service OneLogin has reported a serious breach of its security systems which may have allowed attackers to access user data. The company told its customers that the perpetrators could have decrypted stored passwords.

Google Chrome bug lets sites secretly record from your webcam

A bug in Google Chrome could allow malicious webpages to surreptitiously record video without your knowledge. The warning comes from a security researcher who discovered a way to bypass Chrome's usual indication that a recording is active.

Internet Archive 'carbon dated' using Bitcoin technology

The entire Internet has been timestamped using a cryptographic technique based on the blockchain technology that characterises digital cryptocurrencies like Bitcoin. The work allows Bitcoin timestamps to be downloaded for almost any online content.

Hackers find way to hijack PCs using malicious subtitle files

Hackers have discovered a way to take control of computers using a creative exploit of subtitle files in media players. Researchers found that several highly successful multimedia programs house a subtitle flaw that could hand attackers complete control.

Improving email security against cyber attacks

A new study aims to help organizations improve email filters. This is based on analysis as to why phishing scams are successful and how computer systems can be better protected.

Samsung's Galaxy S8 iris scanner fooled by a photograph

Samsung's "ultrasecure" iris scanner on its Galaxy S8 smartphone has been fooled using a photograph and contact lens. The method is alarmingly trivial to use and raises concerns about the safety of the biometric authentication technique.

Bank's voice recognition system fooled by user's twin

The voice recognition security system used by a major UK bank was compromised in a test by a user's twin. The breach allows recent transactions to be displayed and money to be transferred between accounts. Withdrawals are not permitted.

Mar-a-Lago, other Trump properties easy targets to hack: report

An investigation has determined the Internet security at Mar-a-Lago and other Donald J. Trump’s properties is extremely weak. Three investigators determined the Wi-Fi systems of these properties could be hacked into in about five minutes.
  1 2 3 4 5 6 ... 7 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
A hacker in action.
A hacker in action.
Davide Restivo