vulnerability

Visit/security/34127/cisco-pays-out-86m-in-damages-over-faulty-government-software
Security

Cisco pays out $8.6m over cyber security failings

Claim argues company left vulnerable video software unpatched for five years
1 Aug 2019
Visit/security/34109/hackers-can-bypass-visas-contactless-spending-limits
card and contactless reader
Security

Hackers can bypass Visa's contactless spending limits

The researchers and Visa disagree on the severity of the threat presented by the hack
30 Jul 2019
Visit/security/34033/why-the-telecoms-industry-is-particularly-vulnerable-to-bluekeep
Security

The telecoms industry is particularly vulnerable to BlueKeep

The industry's exposure far exceeds any other, but it's not down to incompetence
17 Jul 2019
Visit/security/34024/ncsc-hails-successful-proprietary-anti-phishing-technique
Security

NCSC hails successful proprietary anti-phishing technique

The fight against phishers is looking hopeful, but GCHQ's security arm certainly isn't without its faults
16 Jul 2019
Advertisement
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/security/33996/critical-infrastructure-at-risk-again-from-stuxnet-like-attack
Hacking
Security

Critical infrastructure at risk from Stuxnet-like attack

Researchers find gaping flaws in critical systems used in the most importnt industries across the globe
10 Jul 2019
Visit/security/33953/nhs-must-spend-now-to-prevent-devastation-of-wannacry-20
Cyber security skull
Security

NHS must spend now to prevent devastation of ‘WannaCry 2.0’

Positive moves are being made but they will count for nothing if a more sophisticated attack strikes
4 Jul 2019
Visit/two-factor-authentication-2fa/33833/google-turns-android-phones-into-2fa-keys-for-ios-login
two-factor authentication (2FA)

Google turns Android phones into 2FA keys for iOS login

FIDO keys touted as the most secure protection against hackers and phishing campaigns
13 Jun 2019
Visit/security/33779/how-mr-robot-fudged-its-hacks-to-protect-the-public
Mr. Robot poster
Security

How Mr. Robot ‘fudged’ its hacks to protect the public

Showrunners debated over how accurate to make the show’s exploits
5 Jun 2019
Visit/security/33633/critical-cisco-exploit-hands-attackers-keys-to-your-business-network
Security

Critical exploit leaves Cisco enterprise routers vulnerable

Vulnerability in popular network hardware exposes core security module to remote hacking
14 May 2019
Advertisement
Visit/spyware/33632/whatsapp-call-hack-installs-spyware-on-users-phones
spyware

WhatsApp call hack installs spyware on users’ phones

iPhones and Android devices are vulnerable to security flaw – WhatsApp recommends immediate app update
14 May 2019
Visit/security/33457/apache-fixes-dangerous-rce-flaw-in-tomcat-application-server
Security

Apache fixes dangerous RCE flaw in Tomcat application server

Vulnerability affects multiple versions of the software running on Windows
15 Apr 2019
Advertisement
Visit/security/33377/mobile-banking-apps-are-holding-data-insecurely
mobile banking
Security

Mobile banking apps are holding data insecurely

“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud
3 Apr 2019
Visit/security/33242/the-equifax-effect-explaining-the-biggest-security-disaster-of-the-21st-century
Security

The Equifax Effect: Explaining the disaster

We take a deep-dive into how the credit agency got so much so wrong
15 Mar 2019
Visit/security/33052/microsoft-flags-iis-flaw-that-could-lead-to-100-cpu-usage-spikes-when-exploited
Photo of a Microsoft building with clouds in view
Security

Microsoft flags flaw that could cause 100% CPU usage spike

The DoS vulnerability involves sending malicious HTTP/2 connections that can slow down or freeze users' systems
21 Feb 2019
Visit/security/33031/spectre-vulnerabilities-cannot-be-mitigated-by-software-alone
Spectre processor flaw
Security

Spectre vulnerabilities cannot be mitigated by just software

Researchers found that one variant of the critical data-leaking flaw "defeats everything we can think of"
19 Feb 2019
Advertisement
Visit/security/32972/us-email-provider-wiped-out-by-hacker
Security

US email provider wiped out by hacker

Company has its entire infrastructure remotely formatted
12 Feb 2019
Visit/security/32572/the-scariest-security-horror-stories-of-2018
phishing
Security

The scariest security horror stories of 2018

From data breaches to hardware vulnerabilities, these are the most embarrassing security blunders of the year
25 Dec 2018
Visit/hacking/32352/critical-vulnerabilities-in-wordpress-gdpr-plugin-let-hackers-seize-control-of
Image of generic lines of code to indicate hackers at work
hacking

Vulnerabilities in GDPR plugin let hackers seize sites

The flaws, present for at least four months, led attackers to change URL settings and add their own administrator accounts
13 Nov 2018
Visit/security/32286/attackers-target-sip-flaws-in-cisco-firewalls-to-overload-devices
hacking
Security

Attackers target SIP flaws in Cisco firewalls

There are no patches or workarounds available for two software bugs found last week
5 Nov 2018
Visit/security/32264/stuxnet-is-back-iran-admits
malware
Security

Stuxnet is back, Iran admits

The infamous malware is back, and it's "more violent, more advanced and more sophisticated" than ever
1 Nov 2018
Visit/wannacry/31857/us-charges-north-korean-hacker-with-wannacry-and-sony-hack
USA Korea
WannaCry

US charges North Korean hacker with WannaCry and Sony hack

A North Korean programmer is accused of conducting cyber attacks on behalf of the government
7 Sep 2018
Advertisement
Visit/vulnerability/31797/flaw-in-fiserv-banking-platform-exposed-personal-data
vulnerability

Flaw in Fiserv banking platform exposed personal data

The exploit, which has now been patched, affected customers banking with hundreds of financial institutions
29 Aug 2018
Visit/security/31767/incredibly-dangerous-rce-flaw-found-in-apache-struts-2
Security

"Incredibly dangerous" RCE flaw found in Apache Struts 2

Experts indicate it could lead to a second Equifax-level data breach
23 Aug 2018
Advertisement