Cybersecurity

Major banks to roll out ATMs that use smartphones for authentication

Major banks to roll out ATMs that use smartphones for authentication

By

Bank of America, Wells Fargo and JPMorgan Chase have announced plans to roll out ATMs that take smartphones as well as ATM cards.

FireEye report identifies iOS security storm-in-a-tea-cup

FireEye report identifies iOS security storm-in-a-tea-cup

FireEye researchers have released a report which details potential security issues with software used to dynamically patch iOS apps.

CISO salaries and demand for cyber-skills skyrockets, surprising no-one

CISO salaries and demand for cyber-skills skyrockets, surprising no-one

Two new reports from recruitment company BeecherMadden have shown demand for cyber-skills to be rising massively with few able to meet that demand while CISO salaries are also going up.

Data Privacy Day: Cybersecurity experts share advice on protecting data

Data Privacy Day: Cybersecurity experts share advice on protecting data

By

With Data Privacy Day now upon us, cybersecurity experts from across the industry have offered their advice on how both individuals and organizations can protect their data.

Report: Israel cybersecurity startups attract large investments

Report: Israel cybersecurity startups attract large investments

By

Cybersecurity startups hold a premium position within Israel's investment ecosystem and are second only to the U.S., according to researchers at YL Ventures.

Strasbourg approves unified approach to digital single market

Strasbourg approves unified approach to digital single market

The European Parliament has approved its report, Towards a Digital Single Market Act, with cyber-security a major concern. We speak to Estonian MEP Kaja Kallas.

Microsoft and US government clash over Ireland-held cloud data

Microsoft and US government clash over Ireland-held cloud data

Microsoft has rejected a request by the US government to hand over data the software giant holds in Ireland, claiming that the data in question doesn't belong to the company and raising questions of data jurisdiction.

Affinity Gaming sues Trustwave over data breach

Affinity Gaming sues Trustwave over data breach

By

Affinity Gaming has brought a suit against Trustwave, accusing the cybersecurity company of failing to adequately investigate and remedy a data breach.

Cyber-attack among World Economic Forum's top global risks

Cyber-attack among World Economic Forum's top global risks

The World Economic Forum's annual Global Risk report lists cyber-attacks as one of the biggest dangers in an ever more connected world.

PayPal investigates account compromised twice in one day

PayPal investigates account compromised twice in one day

By

PayPal is investigating account that was hacked twice in one day and latter used in an attempt to transfer funds to a dead ISIS hacker.

ICS/SCADA researchers leak default passwords of popular industry systems

ICS/SCADA researchers leak default passwords of popular industry systems

By

ICS/SCADA researchers post the default passwords of popular industrial systems to urge vendors to implement better security controls.

Raspberry Pi declines bribe to pre-install malware

Raspberry Pi declines bribe to pre-install malware

By

The Raspberry Pi Foundation was offered money to pre-install malware on its inexpensive computers by someone claiming to be a "business officer."

Treasury IG urges IRS to fix programming error

Treasury IG urges IRS to fix programming error

By

The Treasury Inspector General for Tax Administration is pushing for the IRS to improve its taxpayer authentication.

Hunting and STIX

Hunting and STIX

By

Today I'm starting a three parter that will introduce you to STIX, a neat way of documenting and understanding your threat hunting targets.

Army National Guard announces 13 new cyber units across 23 states

Army National Guard announces 13 new cyber units across 23 states

By

The U.S. Army National Guard announced new cyberdefense measures that will enable greater cyber protection capabilities in every state.

Internet's root name servers DDoS attacks peak at 5M queries per second

Internet's root name servers DDoS attacks peak at 5M queries per second

By

Two unusual DDoS attacks targeted several of the the internet's root name severs.

NHS all-mobile no-paper system has 'alarming' lack of cyber-security

NHS all-mobile no-paper system has 'alarming' lack of cyber-security

A recent FOI request by cloud solutions company Accellion has revealed an 'alarming' lack of cyber-security in the NHS' use of mobile devices.

Nine percent of HTTPS hosts on the web "share the same private keys"

Nine percent of HTTPS hosts on the web "share the same private keys"

Stefan Viehböck, senior security consultant at SEC Consult, examined 4000 devices from 70 vendors and found widespread reuse of private keys.

Automakers urge Congress to limit regulation on 'Internet of Cars'

Automakers urge Congress to limit regulation on 'Internet of Cars'

By

A hearing was held highlight the efforts that automakers are making to address cybersecurity concerns of connected automobiles.

Report: Banking trojans and weaponized Office docs month's top attack vectors

Report: Banking trojans and weaponized Office docs month's top attack vectors

By

Researchers at Invincea report that banking trojans delivered by weaponized Office documents were the top attack vector for the month of October.

Report: Enterprises should consider user behavior analytics to detect attacks earlier

Report: Enterprises should consider user behavior analytics to detect attacks earlier

By

Understanding user behavior analytics could help enterprises detect cyberattacks earlier, according to researchers at Rapid7.

G-20 nations agree: No cybertheft of intellectual property

G-20 nations agree: No cybertheft of intellectual property

By

G-20 nations struck a deal at a two-day summit in Antalya, Turkey.

DHS official to meet with China to discuss cybersecurity agreement

DHS official to meet with China to discuss cybersecurity agreement

By

Homeland Security Deputy Secretary Alejandro Mayorka will meet with senior Chinese officials to discuss cybersecurity agreements.

 Get used to it?: Mega breaches

Get used to it?: Mega breaches

By

Amid widespread cynicism about mass cybersecurity failures, IT security pros, analysts and vendors are scrambling to develop the strategies, technologies and tools to plug the leaks today and develop long-term approaches to prevent similar collapses in the future.

XcodeGhost hits U.S.firms, targets iOS 9

XcodeGhost hits U.S.firms, targets iOS 9

By

XcodeGhost has been spotted in U.S. enterprises along with a new variant that is designed to infect iOS 9 systems.

Google patches two critical vulnerabilities in Nexus devices

Google patches two critical vulnerabilities in Nexus devices

By

Google has patched two vulnerabilities in Nexus devices that could enable remote code execution and more.

Kevin Spacey, WISeKey team up to raise cyberawareness

Kevin Spacey, WISeKey team up to raise cyberawareness

By

The internet security firm WISeKey has named "House of Cards" actor Kevin Spacey as an industry ambassador to help raise awareness for cybersecurity issues.

Kaspersky says CoinVault and Bitcryptor done

Kaspersky says CoinVault and Bitcryptor done

By

Kaspersky Lab has declared CoinVault and Bitcryptor dead following the both the arrest of its alleged authors and release of a final set of decryption keys.

Take your pick of Halloween cyber-security tricks and treats and horror stories

Take your pick of Halloween cyber-security tricks and treats and horror stories

Raising awareness of cyber-security is a year-round task but what better time than Halloween to use spooks, ghosts and demons to drive home the point?

Iranian hackers show growing interest in Android RATs

Iranian hackers show growing interest in Android RATs

By

Iranian hackers show increasing interest in DroidJack and AndroRAT over other other RATs commonly used to target Android devices.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US