UK consumers committed to mobile privacy
Spurred by high-profile data breaches, Edward Snowden’s revelations, and by the growing awareness that their smartphones hold a lot of sensitive data, most UK users have …
Hack air-gapped computers using heat
Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …
Sensitive data resides in the cloud
With the vast majority of enterprises now making use of cloud environments, 54 percent globally reported keeping sensitive information within the cloud, according to …
Fake “Incoming Fax Report” emails lead to crypto-ransomware
Once again, fake “Incoming Fax Report” emails carrying malware are being sent out to random users. Given the popularity of online fax-sending services, there are …
Flaw in Hilton Honors website left all customer accounts wide open
The discovery of a vulnerability in the Hilton HHonors website that could lead to account hijacking and information theft has put a temporary stop to Hilton Hotels & …
New PoS malware family comes with keylogger component
A new piece of PoS scraper malware has been found and analyzed by researchers from Cisco’s Talos Security Intelligence and Research Group. Dubbed “PoSeidon,” …
Cisco Small Business IP phones vulnerable to eavesdropping
Cisco has confirmed the existence of a flaw affecting its Small Business SPA 300 and 500 series IP phones that can be exploited by attackers to listen to the audio stream of …
Most parents don’t know how to tackle cyber bullying
54 percent of UK parents would have no idea if their child was being cyber bullied, highlighting that most parents are completely ill-equipped and under-educated in knowing …
Tails 1.3.1 emergecy release fixes security issues
Tails 1.3.1, is out. This is an emergency release, triggered by an unscheduled Firefox release meant to fix critical security issues. This version fixes numerous security …
Scammers use Whatsapp calling feature as a lure
Survey scammers and adware peddlers continue to advantage of the interest Whatsapp users have in the quietly rolled out Free Voice Calling feature. According to …
Week in review: Security risks of networked medical devices, mobile apps still vulnerable to FREAK attacks
Here’s an overview of some of last week’s most interesting news and articles: Why senior managers need to be involved in data security There is now a growing …
WordPress plugin used by millions sports critical site-hijacking flaw
Another popular Yoast WordPress plugin has been found sporting a critical vulnerability that can be exploited by attackers to take over control of the site. A week ago it was …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption