Security News Headlines  RSS

Office stationary supply superstore Staples is investigating a pattern of fraudulent transactions after banks traced suspicious activity on cards used at Staples branches in the US. If the claims made in a blog report by revered security expert Brian Krebs prove to be correct, it would make Staples ... 

Staples Investigate Payment Card Data Theft

Jacob Holcomb, an IT security researcher, has created a malicious worm that, if unleashed, could trawl the internet and attack vulnerable hardware. Holcomb wrote the worm as a ‘proof-of-concept’ to illustrate the vulnerability of data storage on insecure hardware to malicious attack. The worm is ca ... 

Malicious Worm Created To Expose Vulnerable Home Data Stores

Six UK universities have submitted master’s degree programmes which have been accredited by GHCQ as a part of the ongoing Cyber Security Strategy. The specialist degrees will offer a qualification in cyber security and is intended to boost Britain’s defences against hackers and cybercrime. "Through ... 

6 UK Universities to Offer ‘Cyber Spy’ Degrees

A modification to one of three Statutory Instruments (SI) in UK copyright law has suggested that photographer’s images should be allowed to be used in certain cases without the need to ask the creator for permission. According to The Register , there are many issues with copyrighted works and how t ... 

UK Government Suggest Using Copyrighted Material Without Permission

The UK government is set to rush through a new law designed to allow enforcement and intelligence agencies to continue to access phone and internet data in order to investigate crime. The Data Retention and Investigation Powers Bill is being backed by all of the major parties and is being passed du ... 

‘Emergency’ Communications Monitoring Law to be Rushed Through

The newest variant of the Cridex trojan, a data stealing piece of malware that targets bank accounts, has been found to self-propagate by downloading a worm to the infected machine. The new variant is known as Geodo and it’s capable of turning every "bot in the botnet into a vehicle for infecting n ... 

Trojan Variant Downloads Worm to Spread

According to analysts at Gartner, the global security software market grew 4.9% in 2013, representing an overall decline for the second year in row. The figure illustrates a growth rate that was lower than expected and this was due to "commoditization of key subsegments and the decline in growth f ... 

Security Software Market Continues to Decline

According to analysts at Gartner, 75% of all mobile security breaches in the enterprise are due to the misconfiguration of mobile apps. This is a worrying statistic, not least because the analysts believe that by 2017 the focus will shift for attackers from PCs onto mobile and tablet devices as ... 

75% of Mobile Security Breaches Due to Misconfiguration

A new report has found that whilst 45% of all network security attacks are due to malware, many of these could be prevented if businesses had sufficient basic protection such as anti-virus and "effective vulnerability lifecycle management”. NTT Groups’ 2014 Global Threat Intelligence Report  ... 

Report Highlights Business Security Failings

Brian Dye, senior vice president for information security at Symantec, has said that antivirus software is dead and that the company no longer view it as a "moneymaker in any way”. It’s thought that the firm will now be focusing on helping businesses that have been hacked. This reflects what’s ha ... 

Symantec: Antivirus Software is Dead

It’s come to light that file sharing and cloud storage services such as Dropbox and Box allow users to "inadvertently” leak their own files due to the way that public sharing links are generated. According to competitor Intralinks, it was able to find and access links which allowed it to access se ... 

Free Cloud Storage Services Leaking Sensitive Data

Security researchers have used the Heartbleed bug to access forums on the cyber-underworld where crooks trade data, according to a report from the BBC. According to one anti-malware researcher, known only as Stephen K, the bug has left many of the forums in a "critical” position and vulnerable to ... 

Heartbleed Used against Cyber-crooks

A new vulnerability affecting Microsoft’s browser IE versions 6 to 11 has been discovered which corrupts memory in such a way that it allows attacks to execute arbitrary code and essentially take over the target machine. The zero day flaw has so far prompted "limited attacks”, according to Micros ... 

IE Vulnerability Affects 56% of Web Browsers

The massive task of cleaning up after the Heartbleed bug could take months, according to leading research company Secunia. In an interview with The Register , Kasper Lindgaard, Secunia head of research said that "everybody is now playing catch-up", especially as more and more affected products co ... 

Heartbleed Clean-up Could Take Months

Microsoft has announced that it will no longer support the initial release of Windows 8.1 from next month and has urged customers to carry out the update to ensure they have the latest version. However, last week many customers reported that they were having problems installing the update, especi ... 

Microsoft Announce End of Support for Windows 8.1

UK Unprepared for Cyber Attacks


10-Apr-2014  11:01

A new report has found that Britain’s police force are overall unprepared for cybercrime, with just three forces nationwide having developed a comprehensive strategy in their Strategic Threat and Risk Assessments (STRAs). Her Majesty’s Inspectorate of Constabulary (HMIC) report looked at the over ... 

UK Unprepared for Cyber Attacks

Support for Microsoft OS XP ends today, but despite having plenty of warning, many UK government machines will continue to run the software. This has led to the government paying for a one year extension at a cost of £5.5 million, the Guardian reports . The cost will cover support for XP, ... 

UK Government Shells Out £5.5m for Extended XP Support

LinkedIn Hack Extension Disabled


03-Apr-2014  12:01

A browser extension which allowed users to scrape hidden LinkedIn email addresses has been disabled by its makers after a cease and desist notice was issued by the professional networking site. The extension, known as ‘Sell Hack’, allowed users to access the email address that was associated with ... 

LinkedIn Hack Extension Disabled

An initiative designed to tackle national cybersecurity incidents has been officially launched in the UK to help protect businesses and government from cyber-attacks. CERT-UK (Computer Emergency Response Team) is based on the National Cyber Security Strategy which was published in 2011 and is a ke ... 

UK Launch Computer Emergency Response Team

A vulnerability affecting all supported versions of Microsoft Word has been reported which allows remote code execution when a targeted user opens a RTF file using the software. Currently, Microsoft say that it has detected "limited, targeted attacks directed at Microsoft Word 2010”. The maliciou ... 

MS Word Bug Leaves Machines Vulnerable

More related news:

1