Latest Security News
Several of the world’s largest tech companies have joined a new effort aimed at helping organisations utilise encrypted server data in-memory while isolating it from other software and applications, enabling them to more securely run applications on-premise, in remote edge sites or in the cloud.
67 percent of UK business leaders say cyber security concerns are preventing them from adopting new technology and blocking their digital transformation strategies, according to a new cyber security report.
The report, conducted by EY, surveyed 175 C-suite executives at UK-based businesses to assess the state of the British cyber security landscape at the board level.
Instagram users can now report app developers they believe are misusing their data as part of an expansion to the social network’s security tools.
The data abuse bounty programme is used to identify violations of policy around data use and rewards those who find and report abuses, the firm said.
A joint paper by researchers at Oxford University, Singapore University of Technology and Design and the Helmholtz Centre for Information Security (CISPA) called the issue “a serious threat to the security and privacy of all Bluetooth users”.
Named the Key Negotiation of Bluetooth attack, the weakness fools the pair into creating a relatively shorter encryption key, making it easier for hackers to crack.
An unencrypted Elasticsearch database containing millions of fingerprints, facial recognition information, unencrypted usernames and passwords, and personal information on employees has been discovered by researchers. The database belongs to Biostar 2, a biometric security platform recently integrated into AEOS, an access control system used by the UK Metropolitan Police.
Uptake of cyber security insurance in the UK is worringly low and placing millions of small businesses at risk, according to new research.
Broadcom seals Symantec deal to boost enterprise cloud security offering Broadcom has finalised a $10.7 billion cash agreement to buy the enterprise security arm of Symantec Corp. The chip manufacturer has been seeking to expand its software efforts. With the addition of Symantec, Broadcom will be able to provide integrated enterprise security solutions, the company… Read More
Exploit could give a hacker complete control over company security systems and thermal systems used in data centres Security researchers have discovered a zero-day vulnerability in a popular building control system that could allow cyber criminals to wreak havoc with operational technology found in factories, businesses and data centres. The system is manufactured by Delta,… Read More
A report claims to have obtained audio recordings which include intimate conversations between loved ones Microsoft contractors are able to listen to some conversations that go through Skype’s translation function, a report has claimed. While the tech giant states in its policies that it may analyse audio recordings to improve translations, it does not make… Read More
Online check-in and departure systems out of action following second IT failure in two years Holidaymakers travelling with British Airways have been left stranded at UK airports after the IT systems that deal with check-in and departures failed. The airline said it has switched to manual systems while the incident, which is not thought to… Read More
Microsoft has patched the vulnerability, which affects virtually all servers and laptops using modern Intel processors A new vulnerability has surfaced that could allow hackers to access passwords, tokens, private conservations and encryption from machines using Intel processors. The side-channel vulnerability, discovered by cyber security firm Bitdefender, affects all machines that use Intel CPUs, run… Read More
Monzo claims no one outside the challenger bank had access to PINs Monzo has advised almost half a million customers to change their PIN after the British online-only bank discovered it was storing their codes as plain text in log files. The bank said that the PINs were stored in a log file accessible to… Read More