MICROBLOGGING NETWORK Twitter has apologised for taking its users' faces and rolling them into its promotional material.
A blog post on the firm's website explains what happened and how bad it feels about it. Twitter says that it created some mock tweets to use in marketing guff without...
Raid millions of bank accounts. New easy-to-use tool. Yours for $5,000
Cybercrooks have put on sale a new professional-grade Trojan toolkit called KINS that will pose plenty of problems for banks and their customers in the months and years ahead.
KINS promises the ease of use of...
Top government spy agencies GCHQ and MI5 are backing audits of the cyber security strategies at the UK’s top firms in order to assess their preparedness against the threat of cyber attacks.
The agencies have added their support to a letter, sent by the department of Business, Skills and...
Stolen card data was uploaded to blank cards used by criminals to make cash withdrawals and purchases
US prosecutors have launched what they say is the country's largest ever hacking fraud case.
Five men in Russia and Ukraine have been charged with running a hacking operation that allegedly...
Hundreds of millions stolen from biggest names in US
Federal prosecutors in New Jersey say they've busted what could be the biggest credit card hacking fraud in US history, with companies such as NASDAQ, 7-Eleven, and Dow Jones falling prey to an Eastern European criminal gang.
According to...
Police are powerless to stop super-smart criminals from hacking the world's biggest companies, a top-ranking security bod has warned.
Juniper Networks' security chief said there was simply no longer any point in calling the police when hackers and DDoSers came to call, because the cops can't do...
Apple's developer portal came back to life over the weekend, eight days after it was allegedly taken down by a Turkish bloke.
The high-fructose computer company delivered its usual non-deluge of information about just what caused it to pull the site down last week. It's being just as verbose...
Chinese PC giant Lenovo has been banned from supplying kit for the top secret networks of western intelligence agencies after security concerns emerged when backdoor vulnerabilities were detected, according to a new report.
Unnamed intelligence and defence “sources” in the UK and Australia...
Here is a tale of two security research presentations, both looking at motor vehicle security in a world in which even the humblest shopping trolley now has more brainpower than a moonshot.
Flavio Garcia, a University of Birmingham lecturer familiar with insecurity in car systems – here, for...
David Cameron has admitted his plans for opt-out content filters will face "many problems" as his proposals begin to take shape, and said that content such as The Sun's Page 3 or Fifty Shades of Grey would not face the axe.
Cameron had asked internet service providers (ISPs) to make adult...
Symantec has plugged a series of critical flaws in its Web Gateway appliances which included a backdoor permitting remote code execution on targeted systems.
The flaws, discovered during a short crash test by security researchers at Austrian firm SEC Consult, created a means to execute code...
Microsoft is warning Brits who use its Bing search engine to hunt down child abuse content that they are attempting to view illegal material online.
The company debuted the pop-up message on Bing in the UK following pressure from the Prime Minister David Cameron, who has been pressing internet...
Students hijack luxury yacht with GPS spoofing
A team of university students have demonstrated that it is possible to subvert global positioning system navigation signals to pilot a superyacht without tripping alarms.
The experiment was conducted in June this year, with the permission of the...
(Phys.org) —UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as "software...
Nato has called for military and private industry to recruit more ethical hackers, listing their skills as an essential weapon in its ongoing anti-black hat war.
Nato deputy assistant secretary general Jamie Shea issued the statement in video review exploring the ethical hacking community. He...
Back on 12 July, world media uncovered a minor sensation: Russia's Federal Protective Service (aka Federalnaya Sluzhba Okhrany, Федеральная служба охраны or FSO in English) had issued a tender for typewriters to help keep its secrets, presumably since a typewriter can't be hacked. As the tender...
Microsoft has gone public with a prototype HTTP/2.0 server.
The server is designed to implement the version 4 HTTP/2.0 implementable draft published by the IETF earlier in July. The idea, according to IETF HTTPBIS chair Mark Nottingham, is that progressive implementations of HTTP/2.0 will...
As part of the NSA's ongoing mission to research the finer arts of computer security, it funds and promotes a lot of academic research. And on July 18 it announced the winner of its first Science of Security (SoS) competition after a distinguished academic panel had considered 44 entries...
Students from the University of Texas successfully piloted an $80m superyacht sailing 30 miles offshore in the Mediterranean Sea by overriding the ship's GPS signals without any alarms being raised.
The team, led by assistant professor Todd Humphreys from UT Austin's department of aerospace...
Microsoft is bringing more companies its threat sharing program and loading potentially dangeous items into its Azure cloud, despite past problems with security leaks.
The changes to the Microsoft Active Protections Program were announced by Redmond on Monday, and will see the company share...