Uber suffers 57 million record data breach, then pays hush-money to prevent disclosure to customers in shocking cover-up that has now been exposed
IT Security Thing was honoured to be one of the judges for the IoT, Cloud & Cybersecurity Innovation Awards 2017 during the NetEvents Global 2017 Press & Analyst Summit in San Jose, we can now reveal the results
Avast owned CCleaner software delivered backdoor trojan as payload in supply chain breach targeting unknown number of large tech enterprises
Is this a lame DUHK, one that has ceased to be, or should organisations rightly be getting their feathers ruffled over the threat?
Sometimes a company’s staff can be a bigger security liability than malware or hackers, as was the case with the recent Swedish transport agency database situation.
There is no doubting that WordPress is popular, very popular. In use by around 25% of the top 10 million websites currently, that gives it a content management system market share of 59%, which makes WordPress security very important.
White Team hackers infect thousands of routers with Linux.Wifatch malware to remove SYNful Knock malware.
While military intelligence is often used as a prime example of an oxymoron, there’s nothing moronic about security intelligence; without it your organisation would be much more vulnerable. So, what exactly is security intelligence then?
Researchers from cyber security consultancy Hacker House, as part of a Sky News investigation, have found a number of NHS trusts fall short when it comes to online data security.
If ransomware is rubbish, as one vendor insisted recently, then why is it so successful? IT Security Thing found itself in Dublin recently, living the rock and roll lifestyle. Well, I stayed in a hotel owned by Bono and The Edge from U2 if that counts. It’s certainly a close call, as one of my afternoons […]
So 13 million MacKeeper users have had their data potentially exposed following a breach. Or at least that’s what you might think having scanned the online headlines.
Adobe Flash is, without a shred of doubt in my mind, living on borrowed time. This is courtesy of many things, but most of all the consistent insecurity record that follows it around like a crazed stalker in a bad movie.
IT Security Thing’s Davey Winder has been telling anyone who will listen that the FBI is being disingenuous when it comes to demanding a backdoor from Apple.
Google research reveals dangers of account hijacking, but in doing so inadvertently prompts some of the dumbest cybersecurity questions ever
If you thought that leaving the EU meant leaving behind the potential impact of GDPR, you thought wrong. The new legislation will simply bring GDPR wholesale into UK law.
What if you could just walk up to an ATM machine and rob the bank right there? What if you also used two factor authentication to stop other robbers doing the same? That’s what Proofpoint researchers have discovered is happening with GreenDispenser ATM malware.
University of Cambridge researchers found, “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.”
Could old hardware be weakening your security posture? New research regarding a design flaw in pre-Sandy Bridge Intel processor architecture provides plenty of food for secure thought.
Researchers from the University of Illinois have published a paper entitled MoLe: Motion Leaks through Smartwatch Sensors, which, if you believed everything you read online, might lead you to think that your smartwatch is at risk to hackers.
DDoS mitigation experts CloudFlare has revealed that when it comes to the attack surface, theory has once again turned into reality with an attack by Chinese smartphones.
According to the Women’s Society of Cyberjutsu only 11 per cent of those working in the cybersecurity industry worldwide are women. That is, frankly, a shocking statistic.