TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners
News about the TalkTalk breach and the investigation of it are coming fast and thick. After the arrests of two teens (one in Northern Ireland, the other from Feltham) believed …
Most consumers believe cloud-based apps can be hacked
Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, …
Nearly 2% of all smartphones are compromised or high risk
By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …
Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays
Here’s an overview of some of last week’s most interesting news and articles:European Parliament members want member states to protect Edward SnowdenToo little has …
US DOJ admits that Stingrays can be used to intercept call and SMS content
After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …
10 tips to avoid viruses on Halloween
As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch so-called BlackHat SEO attacks, i.e. false Google and other search engine …
Second teenager arrested in connection with TalkTalk hack
Police have arrested a second teenage boy in connection with the investigation into alleged data theft from TalkTalk.On Thursday, 29 October, detectives from the Metropolitan …
Android infostealer masquerading as MS Word document
A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users.“The malware portrays itself as a data file with …
Xen Project plugs critical host hijacking flaw, patch ASAP
The latest security update (XSA-145 through 153) for the popular Xen virtualization software fixes nine issues. Eight of them can lead to Denial of Service, but the ninth is …
China is the top target for DDoS reflection attacks
China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of …
European Parliament members want member states to protect Edward Snowden
Too little has been done to safeguard citizens’ fundamental rights following revelations of electronic mass surveillance, members of the European Parliament have stated …
UK dating fraud victims lost £33,5 million last year
Action Fraud, UK’s national fraud and Internet crime reporting centre, and the City of London Police have started a Twitter campaign with the aim of teaching people …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days