Life FBI won’t share its iPhone hack with Apple Feds say they can't hand over what they can't understand 28 Apr
Pro Cyberspies abuse Windows hotpatching to hide malware The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes 28 Apr
Pro DDoS attacks increase in frequency across the globe Attacks are now repeated and sustained, finds Neustar survey 27 Apr
Pro Nine out of 10 attacks effective in minutes More gloomy news from 2016 Verizon data breach investigations report 26 Apr
Pro Bangladesh bank cyber-heist hackers used custom malware to steal $81m Lax security, cheap tools and custom malware to exploit SWIFT software resulted in lucrative heist 26 Apr
Pro Facebook bug hunter discovers backdoor left by other bug hunter Backdoor script stole Facebook employee credentials from a corporate server 25 Apr
Pro Researcher uses Regsvr32 function to bypass AppLocker Regsvr32 is whitelisted, seen as an essential system function 25 Apr
Pro Cisco fixes DoS flaws in wireless LAN controllers, other products One of the vulnerabilities is critical and the rest are rated as high severity 22 Apr
Pro Lack of security talent threatens Irish organisations PEN-testers, analysts and architects among most difficult roles to fill, says Experis 22 Apr
Blogs Keys to the kingdom Australian lock enthusiasts may have created a whole new data centre headache 22 Apr
Pro Android security is stronger than ever Google scanned 6 billion apps per day in the last year in its effort to secure OS’s far-flung landscape 20 Apr
Pro Brian Honan to be inducted to Infosecurity Europe Hall of Fame Joining luminaries such as Mikko Hypponen, Bruce Schneier and Whitfield Diffie 19 Apr
Pro Future of cybersecurity is blended human and artificial intel A new hybrid system from MIT can detect 85% of attacks 19 Apr
Radio Bad robots Niall and Dusty argue over androids and the rest of the headlines from around the world 15 Apr
Pro Ransomware authors use bitcoin blockchain to deliver encryption keys CTB-Locker ransomware uses a metadata field in bitcoin transactions to store decryption keys 15 Apr
Life FBI reportedly bought exploit from hackers to access San Bernardino iPhone Agency is still working through questions about sharing the vulnerability with Apple 14 Apr
Pro Microsoft endorses EU-US Privacy Shield data sharing pact But EU regulators reportedly see the agreement as inadequate 12 Apr
Life WordPress.com turns on default encryption for hosted domains Website owners who use custom domains will get free HTTPS with free certificates 11 Apr
Insights Cloud services, misty security With ever greater adoption of cloud making more organisations hybrid IT users, security is getting more complicated 11 Apr
Pro Focal Point: Beware of ransomware, says Threatscape’s Williams Take the necessary precautions, basic and beyond 11 Apr
Blogs Familiar themes in latest breach reports It's deja vu all over again with Mossack Fonseca hack 8 Apr
Pro Latest Flash zero-day used to spread ransomware Cerber crypto-malware spread through Flash vulnerability, reports Proofpoint 8 Apr
Pro Massive app-layer attacks could defeat hybrid DDoS protection Unusual application-layer DDoS attacks could spell trouble for defences 7 Apr
Pro New Azure tool helps IT tame SaaS apps Microsoft Cloud App Security reveals shadow IT and authorised cloud app usage, along with security controls to manage access 7 Apr
Life WhatsApp turns on end-to-end encryption Messages sent with the popular app may be much harder for law enforcement to access now 6 Apr
Pro Server software a soft target for ransomware Samsam spread by attacking unpatched JBoss app servers 6 Apr
Pro Three-year-old IBM patch for critical Java flaw is broken Attackers can easily bypass the patch to exploit a vulnerability that allows them to escape from the Java security sandbox 6 Apr
Pro Hands On: Surface Pro Type Cover with fingerprint ID Surface line adds to biometric options for Windows authentication 5 Apr
Life FBI will help US agencies with tools to unlock encrypted devices Feds did not commit on using the method tried on the San Bernardino iPhone 4 Apr
Pro Is the blockchain good for security? Blockchain is now being hyped as the solution to all inefficient information processing systems 4 Apr
Life Reddit’s removal of ‘warrant canary’ could hint at US demand for its user data Online discussion website has deletes critical passage from latest transparency report 1 Apr
Pro Merging firms appealing targets for attackers Companies and participants in M&A activity are tempting targets for cyberattackers, says report 31 Mar
Life Court vacates iPhone hack order against Apple, focus shifts to New York Order vacated after FBI said it had accessed data on terrorist’s phone 30 Mar
Pro One-fifth of IT pros admit a mobile data breach Survey shows wide uncertainty about whether smart phones and tablets were involved 30 Mar
Pro Hackers racing to compromise POS systems The transition to chip-based cards appears to have spurred cybercriminals to quickly find the low-hanging fruit, reports FireEye 30 Mar
Pro Google engineer finds flaw in Node.js NPM scripts Self-replicating worm can easily spread through the ecosystem 30 Mar
Life Uber dares hackers to find flaws, offers up to $10k bounty Biggest bounties are for being able to find customer credit card numbers, among other data 24 Mar
Life DoJ knew of possible iPhone-cracking method before Apple case Israeli company already involved in DEA efforts to bypass security measures 24 Mar
Pro Web giants publish new e-mail security standard Goal of the new mechanism is to ensure that encrypted email traffic is not vulnerable to man-in-the-middle attacks 23 Mar
Subscribers 0
Fans 0
Followers 0
Followers