NGOs challenge UK and US mass surveillance in human rights court

How GCHQ and the NSA work together to capture the world’s internet traffic

Windstop

Windstop is an umbrella programme for bulk interception which the NSA operates with the Five Eyes partners – the US, the UK, Australia, New Zealand and Canada.

How GCHQ and the NSA work together to capture the world’s internet traffic

Windstop

Continue reading “NGOs challenge UK and US mass surveillance in human rights court”

NHS Digital aims to put healthcare on firm cyber security footing

NHS Digital aims to put the UK’s healthcare sector on a firm cyber security footing, according to Rob Shaw, chief operating officer at NHS Digital’s Data Security Centre.

Download this free guide

NHS Digital aims to put the UK’s healthcare sector on a firm cyber security footing, according to Rob Shaw, chief operating officer at NHS Digital’s Data Security Centre.

Continue reading “NHS Digital aims to put healthcare on firm cyber security footing”

Hackers Leak More Confidential Athlete Data

The hacker group calling itself Fancy Bears has leaked another batch of athlete medical records stolen from the systems of the World Anti-Doping Agency (WADA). The organization has confirmed the leak and again blamed Russia for the attack on its systems.

The hacker group calling itself Fancy Bears has leaked another batch of athlete medical records stolen from the systems of the World Anti-Doping Agency (WADA). The organization has confirmed the leak and again blamed Russia for the attack on its systems.

Continue reading “Hackers Leak More Confidential Athlete Data”

Supply Chain Cyber Risk: Your Digital Shadow is Getting Longer

Many of the most high-profile breaches have been a result of weak links in an organization’s supply chain. The cyber attacks on Target, Home Depot and the U.S. Office of Personnel Management (OPM) are just a few examples.

Many of the most high-profile breaches have been a result of weak links in an organization’s supply chain. The cyber attacks on Target, Home Depot and the U.S. Office of Personnel Management (OPM) are just a few examples.

Continue reading “Supply Chain Cyber Risk: Your Digital Shadow is Getting Longer”

6.6 Million Users Affected by ClixSense Breach

Hackers have stolen the details of 6.6 million users after breaching the systems of ClixSense, a service that pays people to view ads and take online surveys.

Australian security expert Troy Hunt reported that hackers breached ClixSense earlier this month and obtained 6.6 million user records, of which they made public 2.4 million.

Hackers have stolen the details of 6.6 million users after breaching the systems of ClixSense, a service that pays people to view ads and take online surveys.

Continue reading “6.6 Million Users Affected by ClixSense Breach”

Google Launches Android Hacking Contest

Google announced on Tuesday the launch of a new hacking contest that invites researchers to find serious vulnerabilities and exploit chains in the Android operating system. The search giant is prepared to pay hundreds of thousands of dollars to the winners.

Google announced on Tuesday the launch of a new hacking contest that invites researchers to find serious vulnerabilities and exploit chains in the Android operating system. The search giant is prepared to pay hundreds of thousands of dollars to the winners.

Continue reading “Google Launches Android Hacking Contest”

Apple Patches 7 Flaws With Release of iOS 10

Apple announced on Tuesday the release of iOS 10, Xcode 8 and watchOS 3. The new versions patch several vulnerabilities that can be exploited for information disclosure, arbitrary code execution and denial-of-service (DoS) attacks.

Apple announced on Tuesday the release of iOS 10, Xcode 8 and watchOS 3. The new versions patch several vulnerabilities that can be exploited for information disclosure, arbitrary code execution and denial-of-service (DoS) attacks.

Continue reading “Apple Patches 7 Flaws With Release of iOS 10”

WADA condemns Russian hackers for leaking Olympic athletes’ medical data

The World Anti-Doping Agency (WADA) has confirmed a spear phishing attack allowed Russian hackers to access and leak medical data belonging to a slew of high-profile Olympic athletes.

Download this free guide

The World Anti-Doping Agency (WADA) has confirmed a spear phishing attack allowed Russian hackers to access and leak medical data belonging to a slew of high-profile Olympic athletes.

Continue reading “WADA condemns Russian hackers for leaking Olympic athletes’ medical data”

Insider Incidents Cost Companies $4.3 Million Per Year On Average

Breaches caused by external attackers posing as insiders are the most financially damaging, Ponemon Institute survey finds.

Careless users and contractors continue to be the biggest source of insider incidents at most organizations.

Breaches caused by external attackers posing as insiders are the most financially damaging, Ponemon Institute survey finds.

Careless users and contractors continue to be the biggest source of insider incidents at most organizations. But external attackers posing as legitimate users via stolen credentials can cause far more financial damage, a new survey by the Ponemon Institute shows.

Continue reading “Insider Incidents Cost Companies $4.3 Million Per Year On Average”

Microsoft Patches 47 Vulnerabilities with September Patch Tuesday

Microsoft patched 47 vulnerabilities as part of 14 security bulletins, seven critical, with its monthly Patch Tuesday updates today.

The company is warning users that if left unpatched, 10 of the issues can lead to remote execution.

Microsoft patched 47 vulnerabilities as part of 14 security bulletins, seven critical, with its monthly Patch Tuesday updates today.

Continue reading “Microsoft Patches 47 Vulnerabilities with September Patch Tuesday”