Pro Laptops from HP found to be recording keystrokes Conexant audio driver may have accidentally implemented the keylogging function 12 May
Life Supply chain attack hits Mac users of HandBrake video converter app Mac users who downloaded the app earlier this month may have their computers infected with the Proton Trojan 9 May
Life Sneaky Gmail phishing attack fools with fake Google Docs app Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts 4 May
Life Russian hackers use OAuth, fake Google apps to phish users The phishing schemes can work, in spite of Google's two-step verification, Trend Micro said. 26 Apr
Pro HipChat resets user passwords after possible breach In some cases, messages in chat rooms may have been exposed 25 Apr
Pro Old attack code is new weapon for Russian hackers Researchers find commonalities between tools used against Solaris 20 years ago and modern-day attacks 4 Apr
Pro Report: Criminals find profit rates of up to 95% with DDoS attacks Unsecured IoT devices help drive down cost of attacks 3 Apr
Pro Google’s Android hacking contest fails to attract exploits $200,000 bounty not enough to tempt researchers 3 Apr
Pro Latest WikiLeaks dump exposes CIA methods to mask malware Whistleblower website claims tools were used last year 3 Apr
Radio Puntastic gaming with Jen Carey The state of play for gaming in Ireland, and more from around the Web 17 Mar
Life Twitter Counter fesses up after massive breach by pro-Erdogan hackers Analytics provider compromised for the second time in four months 15 Mar
Radio Facebook Queen Mari Smith on the business of social media This year's Social Media Summit keynote speaker tells all 10 Mar
Life Security holes in Confide messaging app exposed White House user details Security researchers point out glaring problems with protecting user account information 9 Mar
Pro WikiLeaks looks at helping tech vendors disarm CIA hacking tools Vendors claim cyberweapons already dated 9 Mar
Pro Wikileaks’ dump of CIA exploits exposes enterprises to new risks Released data can guide attackers to fruitful exploits, help train less experienced hackers 8 Mar
Blogs Amazon’s biggest problem is digital This week's AWS outage was more embarrassing than dangerous 3 Mar
Life Pence used private e-mail for state work as governor, account was hacked US Vice President’s AOL account reportedly compromised when he was governor 3 Mar
Life Smart teddy bears involved in a contentious data breach Toy maker denies voice recordings were stolen after hack 28 Feb
Life Yahoo warns users of account breaches related to recent attacks 'A forged cookie may have been used ... to access your account' 16 Feb
Pro AI faces hype, scepticism at RSA cybersecurity show CTO warns customers to be careful when buying products marketed as machine learning 16 Feb
Pro Worried about hacks, senators want info on Trump’s personal phone Democrats worried that President’s phone may be unsecured 14 Feb
Life Google ordered by US court to produce e-mails stored abroad An appeals court had taken a different view in a lawsuit involving Microsoft 6 Feb
Life Password-free security uses voice, user behaviour to verify identity Nuance Communications and SecureAuth sound out 100 reasons to be convinced who you are 26 Jan
Life Researchers propose a way to use your heartbeat as a password Patients' electrocardiograph readings would be used as an encryption key to access their medical records 23 Jan
Pro Siblings arrested in Italy’s worst cyberespionage operation ever Brother and sister allegedly attacked at least 18,000 government and corporate PCs 13 Jan
Pro Hacker allegedly stole logins from a US election agency Russian-speaking hacker was found trying to sell the allegedly stolen login credentials 16 Dec
Life Privacy protections for wearable devices are weak, study says Privacy groups warn of lax regulation on smartwatches, more 15 Dec
Pro Yahoo reports massive breach involving 1bn accounts Data breach occurred in August 2013, and is not connected to more recently disclosed breach 15 Dec
Life US election ‘hackers’ look to disrupt Germany vote Fancy Bear group allegedly targeting political parties using spear-phishing attacks 9 Dec
Life Democrats unveil bill to probe Russia’s role in alleged election hacks President-elect Trump continues to doubt that Russia was involved 8 Dec
Life Facebook, Twitter, Microsoft and YouTube will share terror content info Move comes after concern that the companies weren’t taking down terrorist content fast enough 6 Dec
Life Privacy groups urge investigation of ‘Internet of Toys’ Genesis Toys, Nuance Communications on the receiving end of data protection lawsuit 6 Dec
Life San Francisco Muni says server data not accessed in ransomware hit Alleged ransomware attacker threatened to release data stolen from the transit system 29 Nov
Life Wisconsin to recount US presidential election vote after hack concerns Security experts have said that the voting machines could be hacked 28 Nov
Life Bletchley Park to host UK cyber security school Qufaro wants to build school with public and private funding 25 Nov
Pro Trump’s national security pick is a cybersecurity hawk Michael Flynn supports using offensive cyberweapons, talks up need for 'unfair advantage' 21 Nov
Life UK approves extradition of hacker to the US Lauri Love says chances of getting a fair trial 'essentially zero' 15 Nov
Life FriendFinder Network hack exposes more than 410m users Adult sites hardest hit in latest breach 14 Nov
Pro Next-gen infosec pros will come from diverse backgrounds Lateral thinking required in search for new talent, hears (ISC)2 Security Congress 27 Oct
Subscribers 0
Fans 0
Followers 0
Followers