Reports last week of security flaws in the wireless chips used in a wide range of Apple and Android mobile devices came hard on the heels of news that network-enabled toys are being used by hackers to access personal data. The flaw which was discovered by Google Project Zero security researcher, Gal Beniamini said that …
Expansion is also apparent in the range of domains used: the phishing sites discovered in 2015 were spread across 280 TLDs, but last year 432 TLDs were involved. The trend was linked mainly to the availability of very cheap domain names under new TLDs (nTLDs). Compared with 2015, the number of phishing attacks from nTLDs …
Cyber criminals are aggressively sharing credentials to .edu e-mail accounts – including stolen accounts, fake e-mails, and older e-mail accounts. The Digital Citizens Alliance saw evidence showing threat actors of all types – including hacktivists, scam artists, and terrorists – putting credentials (e-mails and passwords) up for sale, trade, or, in some cases, just given …
A recent survey has once again highlighted the urgent need for UK business to take cyber security more seriously. The survey, by Ultima, found that 65 per cent of companies don’t have any security solutions deployed onto their mobile devices, and 68 per cent of companies do not have an awareness programme aimed at employees …
US Senate voted to eliminate privacy rules that would have forced ISPs to get your consent before selling Web browsing history and app usage history to advertisers. Within a week, the House of Representatives could follow suit, and the rules approved by the Federal Communications Commission last year would be eliminated by Congress. So what has changed for …
CloudPets user data, possibly including children’s voice messages were hacked and held for ransom According to security researcher Troy Hunt, a series of web-connected, app-enabled toys called CloudPets have been hacked. The manufacturer’s central database was reportedly compromised over several months after stunningly poor security, despite the attempts of many researchers and journalists to inform …
A blog called Cyberscoop reports that Three years after hackers used a spearphishing attack to successfully gain access to internal data at the Internet Corporation for Assigned Names and Numbers (ICANN), the data is still being passed around and sold on black markets for $300, complete with claims that it’s never been leaked before. The 2014 …
Yahoo is yet again warning users of potentially malicious activity on their accounts between 2015 and 2016, the latest development in the internet company’s investigation of a mega-breach that exposed 1 billion users’ data several years ago. In a statement, Yahoo tied some of the potential compromises to what it has described as the “state-sponsored …
A new analysis by Beaming reports that the volume of attacks hitting individual company firewalls passed the 1,000 per day mark, on average, for the first time in November 2016. This indicated a 310 per cent increase in the volume of attacks seeking out Internet of Things devices between the first and final quarters of …
A new report published State of DNSSEC Deployment 2016 there has been steady and strong growth in both the statistics around DNSSEC signing and validation — and also in the number of tools and libraries available to support DNSSEC. That growth, however, is not evenly distributed. While many separate sites provide DNSSEC statistics, this report that …