Blog Archives

Microsoft Patches 56 Vulnerabilities

Microsoft has released an urgent update to stop hackers taking control of computers with a single email. The unusual bug, in Microsoft anti-malware software such as Windows Defender, could be exploited without the recipient even opening the message. Researchers working for Google’s Project Zero cyber-security...

Google’s battle with Android malware: Who wins?

While most people are aware of the malicious threats targeting their computers, many still don’t realise that their mobile devices are an increasingly lucrative a target for cybercriminals. The main way smartphones are attacked is though apps, often ones which pose as innocent and useful...

Google Docs phishing attack is fixed

Google Docs users were hit by a widespread phishing attempt everywhere being spammed with what appeared to be malicious invitations to log on to their Google accounts. Unlike your garden-variety cyberattack, many of the telltale signs that could tip off that something was awry are...

Phishing attacks using internationalized domains are hard to block

Attackers can evade a security mechanism and abuse Unicode domains to phish for the login credentials of Chrome, Firefox, and Opera users. Security researcher Xudong Zheng has developed a proof-of-concept that exploits an issue in some web browsers. Attackers can abuse this sleight of hand...

Artificial intelligence could be the key to cyber security

In a constantly evolving digital threat landscape, where firewalls and antiviruses are considered tools of antiquity, companies are looking to more technologically advanced means of protecting crucial data. Experts point out the cyber-threat landscape has drastically changed and that criminals are now using more artificial...

Cyber crime is fastest growing economic crime

Cyber crime is perceived as the fastest growing fraud risk (40%), followed by bribery and corruption (36%)around the globe. The UK has seen a double-digit rise in economic crime against corporates in the past two years, with 55% of organisations affected up 11% since 2014...

Security of IoT Devices to Be Rated for First Time

IoT standards groups are emerging to address issues of inter operability, communication protocols and security. Consumer Reports will begin considering the cybersecurity and privacy safeguards of products when rating them – a long overdue move perhaps, given Internet of Things device manufacturers have previously been...

Security Concerns Rising in the Age of IoT

IoT has gone mainstream. Home refrigerators are chattier than ever, and emerging virtual home assistants can order wings for dinner, turn on lawn sprinklers, start the car and purchase pounds of cookies. Yet behind the headlines of these gee-whiz cyber technologies lurks a shortcoming. It...

Old Windows malware may have tampered with 132 Android apps

Google has removed 132 apps from its Play store following a malicious coding flaw that was found possibly because the developers were using infected computers with malware, according to security researchers. The 132 apps were found generating hidden iframes, or an HTML document embedded inside...

Amid cyberattacks, ISPs try to clean up the internet

Antivirus software is not what it used to be. The sneaky, sophisticated security threats your PC faces now have gone far beyond what traditional software can do. The future of protecting your PC will require a multi-pronged approach involving vigilant updates, bug bounties, and artificial...