Vulnerable libuTP protocol could have been used to force torrent apps to send malicious traffic
Agora, one of the largest online black market sites, halted operations after concerns arose of vulnerabilities in Tor's hidden services.
The alleged leader of ISIS' CyberCaliphate hacking group, Junaid Hussain, is believed to have been killed in a recent drone air strike
A Cyphort Labs study on malvertising indicates a massive uptick with this form of attack has taken place over the last few years driven by the proliferation of zero-day and Angler kit exploits.
Canadian researchers at Citizen Lab released a report today describing a phishing campaign being conducted against Iranian dissidents and how utilising a two-factor authentication (2FA) tool helped foil most of the attacks.
The Commonwealth Bank warns that a global cyber-security skills shortage could pave the way for additional high-profile computer attacks in Australia.
A new report on DDoS trends points the finger at one group as the driving force behind many attacks. So, who is DD4BC?
In what is possibly a first for the industry, the SANS Institute is about to inaugurate a new bootcamp-style training programme for cyber-security professionals.
Hackers recently uncovered a man-in-the-middle vulnerability in a Samsung smart refrigerator.
Mumsnet has been targeted once again in a fresh sequence attacks.
Hackers have launched phishing attacks on organisations using legitimate automated management tools, according to Cisco.
The Diplomatic Council is calling for more transparency regarding government surveillance across the world.
Dropbox users may be the target of a new phishing scam that utilises a compromised Wordpress site, according to a post by Dr. Johannes B. Ullrich on the SANS Internet Storm Center InfoSec Community Forums.
Symantec reported that its security software is now protecting more than 1 billion Internet of Things (IoT) devices and as this number expands so will security risks associated with these products.
IBM advises businesses to block access to Tor and other anonymous networks.
Second DDoS attack this year against GitHub code repository - site offline for several hours.
Small businesses have been warned by Cifas and Action Fraud to be on high alert for fake invoices.
iOS 8.4 could have a hard time making apps go to sleep, according to security researchers at FireEye.
The Recordable Activator app was available in the Google Play store and was observed exploiting the Certifi-gate vulnerability.
Action Fraud warns residents of Lincolnshire to be attentive when purchasing pets online.
The growing threat posed by ransomware and the possibility that cyber-criminals will graduate from extorting end users to large corporations topped the worry list of IBM's X-Force threat team in its Q3 threat intelligence report.
Automobile manufacturers in the US have been stung into action by recent hack attacks and damning reports into vehicle cyber-security.
Symantec has found that the Sundown exploit kit (EK) has begun to take advantage of a recent IE vulnerability, CVE-2015-2444
Mozilla add-ons to work across multiple browsers
A lack of encryption and weak or shared passwords on Apple devices are exposing sensitive corporate and customer details in the workplace.
The security community is asked to help catch the hackers whose exposure of around 33 million adultery website subscribers is believed to have led to two suspected suicides and blackmail attempts.
Twitter blocked API access for Diplotwoops, which collected deleted tweets from politicians, diplomats and embassies.
Lee Munson describes how facial recognition could be the future of stronger security via Windows 10.
Data breach by holiday company, Thomson, reveals the personal details of nearly 500 customers.
The 'media content' home page of Australia's largest telecommunications company Telstra has been infected with 'malvertising' which links a malicious exploit kit.
Dolphin and Mercury Android browsers can be hacked to execute code remotely.
Neutrino Exploit Kit has been observed targeting CVE-2015-5119, an Adobe Flash Player zero-day vulnerability.
The Information Commissioner's Office ordered Google to remove links to webpages detailing a minor crime and the company's prior removal of links related to the offence.
Facebook's ThreatExchange platform has closed in on nearly 100 participants since its inception six months ago.
US Embassy official in the UK accused of hacking, phishing and cyber-stalking of women.
By downloading an exception text file that is inserted into the ad blocker configuration files, the Genieo adware variant approach could be used to perform other actions that you don't want, not just allowing adware.
"Quicksand" sandbox vulnerability could enable rogue apps
Another likely serious flaw has been discovered in Android, this time it affects the ability to multitask.
A suspected Chinese hacker group dubbed 'Blue Termite' has been targeting hundreds of Japanese businesses and government organisations in a cyber-espionage campaign stretching back to 2013.
Hackers calling themselves Impact Team have reportedly made a lot more Ashley Madison data available online and in the process apparently teased the adultery site's CEO over the breach's validity.
The Defense Advanced Research Projects Agency (DARPA) has started taking applications to develop a stronger defence against distributed denial-of-service (DDoS) attacks.
ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix
In this week's In Case You Missed It (ICYMI): Big data leaking; Salesforce vulnerability patched; suppressed car hack; ambient sound authentication and critical IE fix.
The Malaysian government is preparing itself against cyber-attacks threatened to occur two days before National Day on 29 August.
After lightning struck a local utility grid, one of Google's European data centres suffered a power outage that led to "some" permanent data loss.
New DRDos attack using BitTorrent investigated: able to amplify traffic up to a factor of 50 times on average, and 120 times in the case of BTSync.
Researchers have discovered a patch for a critical bug in Internet Explorer (IE) being used in semi-targeted attacks on visitors to a Hong Kong church.
Police in Japan will re-arrest the CEO of the collapsed Bitcoin exchange MtGox on theft allegations.
UK financial firms urged to boost defences against cyber-attacks.
Mumsnet experiences DDoS attack while its founder, Justine Roberts, suffers a swatting attack.
Charlton Floate, 19, crashed government websites in the UK and one used by the FBI.
Vulnerability could have allowed hackers to siphon off data from Firefox servers
Personal details of hundreds of UK public figures are among the estimated 33 million credentials leaked yesterday by hackers who breached the Ashley Madison adultery website.
Spending on the outsourcing of IT functions is rising, according to a new report from Computer Economics.
Adobe released a hotfix for LiveCycle Data Services, patching a vulnerability that could result in information being disclosed.
OS X flaw is exposed by teenage Italian security researcher without warning Apple - reigniting the debate about 'irresponsible' bug disclosure.
Trend Micro says the Russian APT group, Pawn Storm, has been spying on domestic targets, including the punk rock band known as Pussy Riot.
Internet Explorer vulnerability could allow hackers to take control of victim's PC
The Chinese APT group Emissary Panda has been taking advantage of Hacking Team's Flash Player exploits in its actions.
The Chinese Ministry of Public Security arrested 15,000 people for cyber-crimes as part of a long-term operation dubbed 'Cleaning the Internet.'
Cyber-security bootcamp to train experts of the future at Cyber Development Camp at DMU.
Police are working with the FBI and Interpol to track down people involved in threat by Anonymous Malaysia
Amazon's dash buttons can be hacked for anything
Another critical flaw has been uncovered that affects almost all Android devices
Leaked Edward Snowden documents reveal that up until at least 2013, the U.S. government held intimate ties with AT&T and to a lesser extent Verizon.
Experimental Firefox functionality release to web developers intended to block Internet tracking elements
The first open source ransomware has been published by Utku Sen.
VW hacking report still has one line redacted
Adobe ordered to pay $1.1 million (US) in legal fees as well as an "undisclosed settlement" to users following breach that affected 38 million.
A Reuters article claimed the Russian cyber-security firm intentionally poisoned good files to throw off competitors' antivirus detection.
Kaspersky's latest report shows that in the second quarter of 2015 spam was controlled by emails based on real events.
Survey reveals over four-in-five firms have seen an increase in attacks on infrastructure
IT security firm and law enforcement sign memorandum of understanding
Second authentication tier is proximity of user's phone to login device
The vulnerability was identified by security researchers with MWR Labs, and it impacts Google Admin version 2014101605 and lower.
Major smartwatch brands fail to keep data secure
India and US team up to ensure global cyber-security
Researchers at Malwarebytes uncovered a malvertising campaign against AdSpirit.de, similar to the one used recently on Yahoo.
Microsoft's Windows 10 allows for certain data-sharing settings to be disabled, but in some cases, turning them off does nothing to stop the sharing.
Organisations failing to protect information within Big Data projects
Cross-Site Scripting (XSS) vulnerability within a Salesforce subdomain now patched
Slew of updates to fix dozens of vulnerabilities in Apple products
Enterprise organisation employees asked what types of internal security data they collect, process and analyse daily.
Cloud storage gets dongle protection from phishers
Researchers say that campaigns leveraging the Asprox botnet have disappeared after reaching a peak last year.
Attackers have been observed substituting Cisco's IOS bootstrap with a malicious ROMMON image after first accessing the company's IOS devices.
The latest ICYMI column looks at the biggest stories on SC this week, including non-jailbroken Apple hack; carphone Warehouse breach; Firefox patch and more.
The ICTTF is led by Paul Dwyer to assist nations in the fight against cyber-crime.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- BitTorrent moves to patch reflective DDoS attack flaw
- Recovering from virtual breaches is doubly expensive for businesses
- Symantec identifies 49 new modules associated with Regin
- ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert
- Dark website Agora closes over Tor vulnerability suspicions