Microsoft has uncovered a flaw in all supported versions of Microsoft Windows that could allow hundreds of millions of computers to be taken over by a remote attacker, International Business Times reports.
Archives - November 2014
Following last month's leak of 13gb worth of private Snapchat videos, the vanishing message service has announced a new policy whereby it will automatically detect third-party apps, and advise users to disconnect them, reports Tech Crunch.
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
As we've reported before, users and businesses leaving their router username and passwords as the manufacturer's default are potentially leaving themselves open to an easy hack, but a new website has sprung up illustrating the point in alarming detail.
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- “air-gapped” networks -- and exfiltrate sensitive files from them through removable drives.
A new wristband that aims to replace the password has launched a crowdfunding campaign on Kickstarter. At the time of writing, Everykey has passed the halfway mark on its $100,000 funding target with $56,586 pledged with 19 days to reach $100,000. Using Bluetooth, the Everykey promises “immediate access to a user’s password-protected electronics such as
Google has teamed up with the University of California in San Diego to publish surprising new research about phishing, how effective it is and how scammers work their phishing operations.
Although phishing scams are something everyone should always be vigilant to, AppRiver has identified two specific Amazon types which are currently targeting the UK market, Tech Week Europe reports.
September's breach of Home Depot that saw 56 million sets of credit and debit card data stolen was not the only thing lost in the leak, the company has revealed.
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.
A year ago, Silk Road 2 appeared on the dark web, after the original Silk Road site's illegal drug trade was shut down by the FBI. Now, Wired reports Silk Road 2 has met a similar fate to its predecessor.
If you use Gmail as your ‘main’ email account - or rely on Google services such as Drive for work - it’s well worth revisiting Google’s Settings menus to give your Google security a boost.
Government requests for private Facebook data have increased by nearly 25% since the second half of 2013, the social networking giant has reported.
A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
Echoing sentiments from across the Atlantic earlier in the year, the head of British spy agency GCHQ as made calls for crypto backdoors into phones to tackle crime, stating, "privacy has never been an absolute right."
A group of Canadian issuing banks have begun a pilot test of an NFC-enabled version of Nymi - a biometric wristband that uses the cardiac rhythm of the wearer to authenticate the user's identity.
American Express has launched a new service, which looks to swap payment card numbers with unique tokens, reports Network World.
City University professor Dr David Stupples and a team of researchers are looking into ways of minimizing the risk of hacking planes in the future.
A special Parliamentary Select Committee has told peers in the United Kingdom's House of Lords that there will be a global shortage of " no less than two million cyber security professionals" by the year 2017, IT Pro Portal reports.
The BBC reports that there is currently one Wi-Fi hotspot for every 150 people in the world, but these unmonitored hotspots can potentially cause problems, experts have warned.