Windows Defender has come to the rescue giving users the ability to detect and remove the vulnerable Dell certificates from the certificate root store, as well as the affected binaries that might re-install it.
CryptoWall 4.0 has been spotted being distributed not by the classical phishing campaign but by the ever-more prevalent exploit kit.
CryptoCoinNews and Hacked offer bounty of five bitcoins to catch blackmailer who is holding them to ransom with DDoS threat
Most corporate attacks apparently happen on a Friday, but just imagine how much of a threat is posed to retailers this coming weekend which is topped and tailed by Black Friday and Cyber Monday?
Stefan Viehböck, senior security consultant at SEC Consult, examined 4000 devices from 70 vendors and found widespread reuse of private keys.
The reFUD.me malware services website has been taken down thanks to a joint effort between the National Crime Agency and Trend Micro.
Amazon has suddenly force-reset many of it's customers passwords after a vulnerability scare
Hilton Worldwide locations around the world have Point of Sale systems infected with malware which steals personal information when processing card transactions.
Dark web version of GitHub offers a place for developers to code controversial projects anonymously.
Just one month after US and UK law enforcement helped take down Dridex, Trend Micro is reporting the botnet is bouncing back.
Brazilian researcher discovers double security threat in Arris cable modems which allows an attacker to rewrite the firmware without the owner's knowledge.
Anonymous' crowd-sourced Twitter war against the so-called Islamic State has been hit with accusations of unreliability.
Dell reported that it has been shipping Inspiron 14 laptops since August that inadvertently contained the security certificate, eDellRoot, that essentially gives hackers complete access to the system.
Dangerous vulnerabilities have been discovered in network-connected alarm systems by British penetration tester, Andrew Tierney.
Smart TVs are not being targeted by hackers right now, but a researcher at Symantec has noted that cyber-criminals have a wide range of options if they wish to breach the average Smart TV.
Consumers are finally beecoming aware of the value of their data, and show preference to companies that protect it.
Starwood Worldwide, Mandarin Oriental, Hilton and Trump hotels all experience card processing system calamities.
iSIGHT says it has discovered the most advanced POS malware it has ever seen, with the ability to customise its attacks to individual victims.
Since other malware types have a presence that is immediately noticeable, ransomware is said to be the first problem child piece of malware.
NetClean's CEO calls on workplaces to be on lookout for child sexual abuse imagery on work computers as the children's commissioner for England publishes her report which says only one in eight cases are reported.
Security company, Damballa, has discovered two new utilities for 'wiping malware', like Destover, which allow it to better hide its tracks and disguise itself among your regular files
Porn apps for Android have been discovered stealing personal data from mobile devices.
A team of mathematicians were able to break a key used as part of the encryption system that secures many of the most critical IoT technologies internationally.
Security researcher claims United Airlines sat on serious bug for five months which would have allowed an attacker to access customers' flight details and even cancel flights.
More than 12 million Brits (20 percent) have been victimised by cyber-criminals this past year.
The EU is looking to crack down on anonymous currency exchanges that could be used by terrorist.
Microsoft customer Nick Ioannou "incredulous at company's failure to fix Safe Links flaw which leaves security holes in supposedly cleansed email"
Cyber-criminals are using the fear generated from the recent wave of terror attacks to target corporate offices in the Middle East and Canada with spear-phishing attacks.
Forty-two young codebreakers competed Friday in a realistic cyber-security simulation, designed to unearth hidden talent and find tomorrow's cyber-security experts.
Dyreza trojan updated for Windows 10
Security researchers at Bleeping Computer and Emisoft have declared the short-lived ransomware, which threatened to reveal private files, dead.
Adware Shedun takes advantage of legitimate features in Android Accessibility Service
Industry leaders gathered this week in the City of London's Sky Garden to discuss that most pressing of issues: How to respond to a breach - successfully.
Some 69 percent of users would bypass security controls so they could win business.
Researchers at the Microsoft Malware Protection Center have observed a hacking team that they call Strontium aiming zero-day attacks at servers in within members of NATO and some governments within Eastern Europe.
Berlin-based secure communications app Telegram found to be playing cat-and-mouse game in a bid to curb extremists accounts.
Protecting oneself online has become of utmost importance in Scotland with people advised to take action by the Scottish government, which has introduced a plan for businesses and individuals to remain safe online.
New survey reveals just four exploit kits are thought to be responsible for 96 percent of malicious activity on the internet.
Following the attacks on Paris on Friday, the French government is scrambling to upgrade its intelligence capabilities which have suffered from under recruitment.
Researchers at Invincea report that banking trojans delivered by weaponised Office documents were the top attack vector for the month of October.
G-20 nations struck a deal at a two-day summit in Antalya, Turkey.
Further security and privacy risks to users of Siri, Apple's personal assistant, have been revealed that could allow anyone to gain entry to personal data on someone else's iOS device.
The number of phishing attacks in Russia and the EU countries has significantly increased in recent months.
Chancellor George Osborne has warned that ISIS is directing its cyber-security hacking power at key UK infrastructure facilities.
During a visit last week from Indian prime minister, Narendra Modi, Britain's prime minister, David Cameron, agreed to work with India to institute a cyber-security training centre.
Partially attributed by poor enforcement policy, almost half of security professionals feel a breach will occur in the next year and will be conducted by an insider.
Electronic Frontier Foundation wins control of fake .org website which may have been under the control of the Russian APT28 group.
Anonymous' campaign against the Islamic State's internet assets has been criticised as a move that only hinders security and intelligence services attempts to investigate them.
Lax cyber-security protocols in Chinese factories identified by one commentator as possible source of infection which could impact many other IoT devices.
The Tor project alleged that the FBI paid Carnegie Mellon University researchers to attack Tor hidden services last year.
In a ruling that could reshape future FTC enforcement authority, an administrative law judge has ruled in favor of LabMD bringing to an end a protracted battle between.
When it comes to what security professionals need to do to protect their organisations not much has changed in a couple of decades, though perimeters have all but dissolved and the timeframe for taking action has become more compressed, according to members of a Tuesday panel at SC Congress in Chicago.
A new study investigating how IT security professionals assess and mitigate cyber-security risks showed much room for improvement.
As quickly as researchers discover ways to remove and block Remote Access Trojans used for spying on mobile devices and computers, hackers are creating new spyware strains from previously discovered malware - and they are developing more advanced capabilities than the original malware.
In a speech delivered at the UK's centre of all things cyber-security, GCHQ, the chancellor of the exchequer George Osborne outlined a comprehensive plan for securing the online nation.
Users' locations, preferences and personal information are now exposed to man in the middle attackers through TanTan, a popular Chinese Tinder replicate.
A new threat intelligence report from FireEye has identified a group using techniques and tools commonly employed by retailers to target high-level government and military officials.
The current and former directors of the world's most famous intelligence agency lay the blame for terror attacks including Paris at the feet of Edward Snowden and encrypted messaging.
The cost of cyber-crime to Northern Ireland was estimated to be £100 million per year.
A new phishing campaign targeting DHL delivery customers has been detected by the Comodo Antispam Labs team.
An attack campaign described as having plenty of potential has collected extensive information from the internet and compromised selected websites.
Forty-one percent of UK adults admit that they know the PIN password to their partner's phone and would snoop if they suspected their partner of being unfaithful.
Hacktivist group Anonymous has vowed vengeance against the group called Islamic State for the Paris attacks on Friday, claiming it will destroy the terrorist group's online operations and expose its members.
Malicious barcodes could be used to infiltrate security infrastructure, according to security researchers who found they could send ASCII characters and open command shells via the barcode scanner.
Some commentators are calling for the acceleration of the controversial Investigatory Powers Bill in the wake of Friday's attack in the French capital.
Inter-server technology worries - STARTTLS stripping forces a user's sending machine to skip encryption
Six percent of the 500 most visited UK websites (ranked by Alexa.com) may be exposed to attack using a nearly decade old vulnerability reports Xiphos Research.
A 51-year-old British man is headed to prison after being found guilty of DDoS attacks that knocked more than 300 websites offline in 2013.
Jonathan Petit, principal scientist at Security Innovation Inc, showed off his new work on hacking automated vehicles through the car's sensors at Black Hat in Amsterdam.
Britain and the US accomplished a planned drill with leading global firms to see how they would respond to a cyber incident in the finance subdivision.
Facebook says that government requests for data and insistence to take down content grew in the first half of 2015.
ICYMI: Windows deprecating SHA-1; Apps leaking data; Safe Harbour II; Auto-rooting adware; Apple Pay
In Case You Missed It: the most popular articles from the past seven days. Windows accelerates SHA-1 deprecation, Too many apps leaking personal data, Safe Harbour 2 coming soon, Apps auto-rooting Android devices, and Bank warning to Apple Pay users.
The government must intervene to help improve cyber-security standards within the industry, according to GCHQ director Robert Hannigan.
Sitting in the F-Secure Labs in Helsinki, Sean Sullivan, security researcher at F-Secure warned that the "future is extortion" as cyber-criminals target small-to-medium size enterprises for high returns.
Cyber-criminals have been trying to infect point of sale terminals in time for Christmas with a new strain of malware dubbed AbaddonPoS.
SC sat down with Veracode's Chris Eng to talk about securing the internet of things and the future of cyber-regulation.
Google will no longer offer Chrome support for Windows XP, Vista and several older versions of Mac OS X, the company announced, as it released several Chrome and Chrome OS updates.
Education and professional support - especially in the rapidly developing field of cyber-security - will be a focal point of Christos Dimitriadis's term as global president of ISACA.
Intimate photos of a woman were posted to a "revenge porn" website by a man she met on a dating website.
There is no air gap between IT and OT that was the key message for oil and gas sector CISOs coming out of the Black Hat Amsterdam talk by Alexander Polyakov and Mathieu Geli
An estimated 70 million phone calls made by prisoners in the United States have been hacked and leaked to The Intercept.
The latest threat to mobile phones is LTE/4G hacking but is the threat, being demonstrated at Black Hat Europe this week, something to be concerned about now?
A prediction by Gartner foresees that 6.4 billion connected things will be globally in use in 2016 and will reach 20.8 billion by the year 2020.
As this year's Slush conference opens, securing The Internet of Things has become a hot topic with many of the exhibiting companies tackling the issue head on.
Malwarebytes spotted malvertising on the Barclays Premier League official fantasy site that redirected users to Nuclear Exploit Kits that exploited Flash vulnerabilities.
Germany's federal intelligence service, the Bundesnachrichtendienst (BND), spied on the embassies and interior departments of ally countries, and international non-governmental organisations, according to Der Spiegel.
The secure network of the UK parliament has been breached and some of its computers compromised by hackers.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- Security researcher blasts United Airlines' bug bounty programme
- Video: Young and gifted codebreakers compete in cyber-security masterclass final
- Social engineering: hacker tricks that make recipients click
- Five last minute retail risk mitigations for Black Friday weekend
- Anonymous' Twitter war hits stumbling block
- ISSE Berlin: Germany to promote 'digital sovereignty'
- Purchasing cyber-insurance without a proven security system will leave businesses out of pocket
- Sophisticated Apple Phishing Email making the rounds
- ISSE Berlin: Safe Harbour II initial agreement expected
- 2015 worst year in history for Mac malware