More From Jason Murdock
Apple vs FBI: Three-day extension granted in historic encryption case
Apple granted three-day extension until 26 February to file official response.
Feb 19, 2016
Google Android: Xbot malware contains cocktail of data theft and ransomware
Xbot uses a method of attack called 'activity hijacking' to mirror legitimate applications.
Feb 19, 2016
Spotify Premium hack: Leaked data exposes hundreds of compromised account details
Data dumps contain email addresses, passwords, account types and renewal dates of Spotify Premium users.
Feb 19, 2016
Anonymous: Hackers plan DDoS campaign against Israeli military to protest Mohammed Al-Qeeq detention
Anonymous posted a slew of IP addresses relating to a range of websites including the Israeli Defense Force.
Feb 18, 2016
Apple vs FBI: What is everyone saying in debate over iPhone encryption?
From WhatsApp to the White House: the major responses to the Apple vs FBI encryption controversy.
Feb 18, 2016
Windows 10: US Defence to upgrade four million devices from XP to improve vulnerable security
The 'unprecedented' move is an attempt to create distance with vulnerable legacy systems like Windows XP.
Feb 18, 2016
FBI hack: Scottish 15-year-old arrested on suspicion of gaining access to US federal systems
Scottish Police confirm to IBTimes.co.uk that the teenager had been arrested in Glasgow and released on bail
Feb 18, 2016
Theresa May echoes FBI and GCHQ stance on strong encryption
May has called on nations involved in the 'Five Eyes' agreement to step up intelligence sharing.
Feb 17, 2016
IoT exposed: Amazon-listed CCTV recorder contains a security backdoor that captures screenshots
Security researchers at Pen Test Partners have uncovered a spate of severe security issues in a fresh DVR test.
Feb 17, 2016
What is ransomware: How to react if you are infected and should you pay the hackers?
As cyberattacks are reported around the world, here is everything you need to know.
Feb 17, 2016
Western Australia parliament hack: Cyber-attack forces government communications blackout
A so-called 'Trojan virus' had circumvented the parliament's IT network
Feb 17, 2016
Hacking by GCHQ 'fundamentally weakens the security of the internet', says UK lawyer
Scarlet Kim, lawyer with Privacy International, will continue to challenge the GCHQ ruling.
Feb 16, 2016
CIA director John Brennan: 'Hackers can get into the personal emails of anybody'
The director of the CIA opens up about the threat of cyber fraud after his personal email was hacked last year
Feb 16, 2016
Julian Assange: UN human rights expert calls on UK and Sweden to free WikiLeaks founder
Alfred de Zayas claims inaction by UK government "erodes the credibility" of UN system.
Feb 16, 2016
Anonymous: Hacker unleashes 17.8GB trove of data from a Turkish national police server
The hacker, believed to be using the pseudonym ROR[RG], chose to release the police files via The Cthulhu.
Feb 16, 2016
How a security researcher easily hacked a hospital and its medical devices
Kaspersky Lab security researcher Sergey Lozhkin outlines how he hacked a hospital via WiFi.
Feb 15, 2016
Los Angeles: Hackers demand $3m bitcoin ransom from hospital to unlock vital files
LAPD and FBI drafted in to investigate ransomware-style cyberattack at US hospital.
Feb 15, 2016
North Korean hackers accused of targeting South Korea with mass spam campaign
Latest hacking campaign from North Korea reportedly targeted South Korean organisations.
Feb 15, 2016
Google Android: Smartphones hit with Mazar Bot malware that can 'erase everything'
Security experts claim evidence suggests the attackers operating the malware are Russian.
Feb 15, 2016
UK police arrest 16-year-old suspected of hacking FBI and CIA accounts
The hacker is thought to be part of the notorious 'Crackas With Attitude' (CWA) collective.
Feb 12, 2016
North Korea: Kim Jong-un hates the United States but loves his MacBook
There is evidence that the admiration of Apple has been passed down through the generations.
Feb 12, 2016
CIA declassified: Kickstarter campaign aims to liberate 10 million secret documents
Launched by crowdfunder Michael Best on 1 February this year, the project is asking for $10,000 in donations.
Feb 12, 2016
iPhone 1970 bug: Why changing the time will brick your device
Users find turning the clock back to 1970 will leave iPhones completely useless.
Feb 12, 2016
How to protect your email account from hackers: Six tips to help you stay safe
An email account is the gateway into your personal life so security is important, right?
Feb 11, 2016
Harvard report: Sadly for law enforcement, banning encryption would be futile
Banning encrypted products would only leave the general public at risk, researchers warn.
Feb 11, 2016
From encryption to bulk spying: Highlights of the Joint Committee report on the Snoopers' Charter
The UK Joint Committee has released its verdict on the Snoopers' Charter – here's what they thought.
Feb 11, 2016
Twitter security chief calls for industry regulation 'that has teeth' and the embrace of Tor
Legislation should enforce a "basic set of user rights", according to Twitter chief Michael Coates.
Feb 11, 2016
VTech hack: Toy manufacturer defends fresh security stance amid strong criticism
The firm's updated terms of service shifts the blame of any future data breach directly onto its users.
Feb 10, 2016
Medicaid breach: healthcare data for 91,000 clients compromised
The discovery came to light after a whistleblower brought forward evidence of 'misuse of state resources'.
Feb 10, 2016
Google bulks up Gmail security by adding a warning to unencrypted emails
Gmail now adds visible icons to warn against insecure email communication.
Feb 10, 2016
Pages
- PREV
- 51
- 52
- 53
- 54
- 55
- 56
- NEXT




