Europol has taken down the WebStresser service, one of the biggest DDoS-for-hire portals, as part of Operation Power Off
The High Court has ruled that the controversial Investigatory Powers Act (2016), also known as the Snoopers’ Charter, is illegal and must be amended.
Uber suffers 57 million record data breach, then pays hush-money to prevent disclosure to customers in shocking cover-up that has now been exposed
Towards the end of November, Hilton Worldwide issued an official statement admitting that it had “identified and taken action to eradicate unauthorized malware that targeted payment card information in some point-of-sale systems.”
In the fast moving world of IT security, the insider threat remains one of the most, if not the most, insidious threat in almost any environment.
IT Security Thing has been talking to Lorenzo Grespan, a developer with Pentest Limited about secure software development.
The Google Nexus 6P has finally started shipping in the UK, and here at IT Security Thing we have got our hands on one to do a Google Nexus 6P security teardown.
If you want to get a real-world handle on how the cybersecurity threatscape is being shaped, and therefore understand both threat evolution patterns and the best methods to mitigate against the resulting attacks, quarterly research reports are your best bet.
University of Cambridge researchers found, “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.”