The Ritz suffers data breach after hackers pose as staff
data breaches

The Ritz suffers data breach after hackers pose as staff

Credit card fraudsters potentially compromised the personal data of guests visiting the five-star hotel
17 Aug 2020
Alexa flaws may have let hackers steal voice history
Amazon Echo
vulnerability

Alexa flaws may have let hackers steal voice history

Certain Amazon and Alexa subdomains were vulnerable to cross-origin resource sharing and cross-site scripting attacks
17 Aug 2020
The IT Pro Podcast: Attack of the AI hackers
artificial intelligence (AI)

The IT Pro Podcast: Attack of the AI hackers

Why the machines really are coming to get you
14 Aug 2020
British teenager charged over Twitter hack
hacking

British teenager charged over Twitter hack

The 19-year old is one of the three individuals arrested for involvement in the spear-phishing scam
3 Aug 2020
Twitter attempts to overhaul its security policies after Bitcoin hack
hacking

Twitter attempts to overhaul its security policies after Bitcoin hack

Hackers targeted 130 accounts but ultimately tweeted from 45
31 Jul 2020
Mid-year report says vulnerabilities up 22% in 2020
hacking

Mid-year report says vulnerabilities up 22% in 2020

Mobile operating system vulnerabilities themselves are up 50%
30 Jul 2020
BlackRock banking Trojan targets Android apps
Trojan virus
trojans

BlackRock banking Trojan targets Android apps

Trojan steals login credentials and credit card information and has targeted more than 300 apps
27 Jul 2020
Election officials are vulnerable to phishing attacks, report warns
phishing

Election officials are vulnerable to phishing attacks, report warns

Less than 20% of election administrators have implemented advanced anti-phishing cyber security controls
27 Jul 2020
More than 1,000 Twitter employees had the security access needed to aid hackers
data breaches

More than 1,000 Twitter employees had the security access needed to aid hackers

Former staff say many had the power to make changes to user account settings as well as hand over the controls to third parties
24 Jul 2020
The IT Pro Podcast: The psychology of security
cyber security

The IT Pro Podcast: The psychology of security

How hackers exploit our brains as well as our binary
24 Jul 2020
Six universities among those hit by Blackbaud ransomware attack
ransomware

Six universities among those hit by Blackbaud ransomware attack

A growing list of those affected also includes at least two charities
23 Jul 2020
Sports industry urged to reform cyber security after £1m Premier League phishing scam
phishing

Sports industry urged to reform cyber security after £1m Premier League phishing scam

NCSC report argues greater awareness is needed as industry attacks surge
23 Jul 2020
Apple’s new iPhone bug-hunting scheme branded a “poison pill"
vulnerability

Apple’s new iPhone bug-hunting scheme branded a “poison pill"

Researchers baulk at hefty restrictions such as being bound to silence during a limitless disclosure window
23 Jul 2020
US charges two Chinese spies for stealing terabytes of data
hacking

US charges two Chinese spies for stealing terabytes of data

The two men are believed to have stolen hundreds of millions of dollars worth of trade secrets and intellectual property
22 Jul 2020
The Twitter hack, and why we need a better class of criminal
Twitter logo with security pictures
hacking

The Twitter hack, and why we need a better class of criminal

The bitcoin scammers’ biggest crime isn’t fraud - it’s lack of imagination
18 Jul 2020
Hackers are taking advantage of Citrix vulnerabilities
hacking

Hackers are taking advantage of Citrix vulnerabilities

Hackers discovered targeting corporate networks impacted by Citrix vulnerabilities
17 Jul 2020
The IT Pro Podcast: The secret life of hackers
hacking

The IT Pro Podcast: The secret life of hackers

What it’s really like to be a professional penetration tester
17 Jul 2020
Researchers detail Tetrade family of Brazilian banking trojans
Trojan virus
hacking

Researchers detail Tetrade family of Brazilian banking trojans

Researchers predict banking trojans will continue to evolve and take on new targets
16 Jul 2020
Best antivirus for Windows 10
antivirus

Best antivirus for Windows 10

Want to stay secure? Here's the best business-class protection around
30 Jun 2020
Phishing attacks target unsuspecting Wells Fargo customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

Over 15,000 Wells Fargo customers targeted in .ics phishing campaign
24 Jun 2020
Trump administration wants to enhance the security of .gov sites
hacking

Trump administration wants to enhance the security of .gov sites

The government hopes to strengthen defenses on all .gov sites to protect users
24 Jun 2020
Cyber criminals use Elon Musk’s name in a giveaway scam
Bitcoin cryptocurrency mining
cryptocurrencies

Cyber criminals use Elon Musk’s name in a giveaway scam

Cybercriminals used name-dropping Bitcoin vanity addresses to steal $2 million in two months
22 Jun 2020
Activists publish 269GB of hacked US police force data
data breaches

Activists publish 269GB of hacked US police force data

DDoSecrets publish more than one million 'BlueLeaks' files including documents, videos and emails
22 Jun 2020
Searching for a new job? That LinkedIn job offer may be fake
LinkedIn on a mobile device
hacking

Searching for a new job? That LinkedIn job offer may be fake

Threat actors use fake job offers to dupe their victims in this attack
19 Jun 2020