Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Improving security with real-time Captcha

A real-time Captcha technique can improve biometric authentication, according to new technology research. This helps to combat hackers who try to use machine learning and image generation software in order to fool legitimate users.

Why private browsing looks set to become more private

Boston - Private web browsing looks set to become even more private following a new initiative. A new system patches the security holes left open by web browsers' private-browsing activities.

Microsoft joins calls for a 'national cybersecurity agency'

Microsoft has advocated a "national security agency" to avoid a "national security quagmire." The company has compiled guidelines to follow when establishing a federal cybersecurity agency. It said it would create a "focal point" for cyber defence.

Millions of dollars in Ethereum could be stolen by attackers

Flaws in smart contracts could allow attackers to steal millions of dollars in Ethereum, according to security researchers. Over 34,000 smart contracts are affected by vulnerabilities that could let anyone acquire the contents of cryptocurrency wallets.

How to reduce the risk of healthcare data loss: Interview Special

The amount of data flowing in and out of hospitals is massive, and this puts it at risk from cyberattack. MediaPro’s Colleen Huber, Director of Cyber Education Strategy looks at what healthcare organizations can do to protect themselves.

Tesla servers hijacked by cryptocurrency miners

Tesla cloud servers were "crypto-jacked" by attackers who used the resources to mine cryptocurrencies. Security researchers discovered Tesla had failed to take basic steps to secure its account, which had no password protection.

AI cybersecurity provider Vectra raises $36m in funding

Vectra has raised $36m in Series D funding in an investment round led by Atlantic Bridge. The cybersecurity company has developed an AI which uses machine learning to monitor corporate networks. Admins get advance warnings if potential problems are found.

Justice Department announces new 'Cybersecurity Task Force'

The U.S. Department of Justice is establishing a Cybersecurity Task Force to help the department combat cyber threats. Its creation has been ordered by Attorney General Jeff Sessions. It will report on the "most effective ways" to address cybersecurity.

'Null character' bug lets attackers bypass Windows 10 antimalware

Attackers could slip malware past Windows 10's built-in detection systems by prepending null characters to files. A security researcher discovered that Windows' Anti-Malware Scan Interface ignores everything after it encounters an empty character.

Google discloses Microsoft security flaw before fix is released

Google's Project Zero cybersecurity research team has disclosed another bug in a Microsoft product before a fix is available. This time, the "Medium"-rated issue lies in Microsoft's Edge web browser. It could allow code injection and execution.

Security flaws in Microsoft software have doubled since 2013

The number of vulnerabilities in Microsoft's software has more than doubled over the past five years. According to independent analysis of the company's own Vulnerabilities Report, the volume and severity of flaws have grown alarmingly over the period.

Global powers must address 'episodes of cyberwar': UN chief

Munich - World leaders must lay the groundwork on how countries respond to cyberattacks that have proven to be a daunting threat, whether by state actors or criminal enterprises, UN secretary general Antonio Guterres said Friday.

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

FedEx left customer passport scans on unsecured server

FedEx has admitted it left sensitive customer data on an unsecured server. Files including passport copies and driving licenses were available for public download for months. FedEx claimed there's no indication the files have been accessed maliciously.

IAmI taps IBM Cloud to defend enterprise networks against attack

IAmI Authentications, a B2B cybersecurity provider, has developed a real-time protection system to defend enterprise networks against intrusion attacks using stolen login credentials. IAmI can issue alerts when an ID is being used without authorisation.

Microsoft to use blockchain to build decentralised identities

Microsoft has announced plans to develop a decentralised blockchain-based identity system. In a blog post, the company supported the idea of using blockchain as a "foundation" to store and distribute user IDs. It will add support to its Authenticator app.

Microsoft to boost enterprise security of aging Windows 7 and 8.1

Microsoft is bringing one of Windows 10's headline enterprise features to Windows 7 and 8.1. Despite maintaining that businesses should upgrade to Windows 10 for maximum protection, Microsoft said it wants to help all customers improve security.

Amazon patches Key flaw that it dismissed as not 'real-life'

Amazon has rolled out an update for a security flaw in its Key smart lock which the company had claimed wasn't an issue. Amazon Key is a system which lets delivery drivers place parcels inside your home. The attack could let anyone through the door.

Consumer Reports discovers smart TVs vulnerable to trivial hacks

Popular smart TVs are vulnerable to simple hacks that can be used to obtain personal information or remotely control the device. The warning comes from Consumer Reports which found "unsophisticated" techniques can be used to extract "very detailed" data.

Consumers 'keenly aware' of data breaches, will boycott services

Almost 70% of consumers would refuse to use a company with poor data protection standards, according to new research. Inadequate data protection could severely impact a company's reputation. 55% of consumers would avoid firms with historical incidents.

Crypto-mining botnet spreads to thousands of Android phones

An extensive botnet of Android devices has rapidly grown since coming to life this week. The ADB.Miner attack is infecting phones and using them to mine cryptocurrency coins. It's the latest example of a new class of crypto-mining cyberattack.

As Internet of Things technology expands do security risks rise?

For many businesses in 2018, Internet of Things technology will play a major part. A significant increase in spend and different technology types is predicted in a new report. However, does expansion bring more security concerns?

Apple and Cisco partner to make cyber insurance less costly

Apple and Cisco have partnered with insurance companies to offer a discounted cyber insurance service. Businesses that source their hardware from Apple and Cisco will be able to claim a reduction on insurance policies sold by Allianz SE.

ATM makers warn of 'jackpotting' hacks on U.S. machines

"Jackpotting," has been a threat to banks in Europe and Asia for some time. Thieves install malicious software on ATMs, forcing them to spit-out cash on command. On Saturday, it was learned ATMs in the U.S. have now come under attack.

Google admits YouTube hosted malicious crypto-mining ads

Google's said it's developing new techniques to detect malicious crypto-mining adverts after YouTube was caught displaying them to unsuspecting users. Ad-based miners are a new form of malware that generate revenue while slowing down the user's device.

How businesses can protect their organizations from within

In 63 per cent of cases, current and former employees are the source of cybersecurity incidents within businesses, according to a new report. A suitable method for not only controlling digital access, but also monitoring it, is essential.

Interview: Ross Nodurft, former White House Cyber Chief Special

Ross Nodurft, former Chief of the Cyber and National Security team in the White House OMB has taken up a new role as Vice President of Risk Management at OWI. He talks with Digital Journal about cybersecurity and related subjects.

In rare show of unity, cloud firms team up to patch Meltdown bugs

Rival cloud providers are collaborating online as they develop patches for the Meltdown and Spectre processor flaws. Faced with incomplete information from Intel and other hardware vendors, "second-tier" companies are choosing to help each other.

New Wi-Fi standard offers 'robust' encryption and security

The Wi-Fi Alliance has announced WPA3, a next-generation security protocol to succeed the current WPA2 standard. The specification improves wireless security on open networks. It also increases encryption strength to protect users of sensitive networks.

Patch for critical Intel CPU flaw could slow PCs by up to 35%

A "fundamental" flaw in the design of Intel processors could allow attackers to access kernel memory. Developers of the Linux and Windows kernels are scrambling to release patches but they might include significant performance penalties.
  1 2 3 4 5 6 ... 10 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Untitled
Bay Dynamics
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple
A hacker in action.
A hacker in action.
Davide Restivo
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Untitled
Loic Venance, AFP

Latest News
Top News