bbc_ddos

American hacking group killed the BBC's online presence to test anti-ISIS attack powers

A huge DDoS attack took the BBC's websites offline on Thursday, as well as the broadcaster's iPlayer streaming service. The disruption lasted for several hours, and now a US-based group of 'cyber hackers' that usually targets ISIS has claimed responsibility.

The New World Hacking group is a self-proclaimed hacktivist group that supports Anonymous. It says that despite effectively knocking the BBC from the face of the web, it was only meant to be a test of server power rather than a targeted attack on the corporation.

By Sofia Elizabella Wyciślik-Wilson -
Spy key

Microsoft's promise of spying warnings is an empty gesture

Yesterday we reported that Microsoft will warn users of 'state-sponsored' attacks on their accounts. Sounds great, but does it actually mean anything? Is it a useful service by the tech giant, or just PR bluster?

Considering the covert nature of spying and digital attacks, coupled with legislation around the world, it seems likely that the announcement is little more than meaningless hot air. In the UK, for instance, the planned snooper's charter would make it illegal for companies to alert users to hacking and surveillance by British agencies.

By Sofia Elizabella Wyciślik-Wilson -
eye spy keyhole

US is spying on its allies for 'national security' purposes

Even though US president Barack Obama promised to end the eavesdropping on highly-positioned officials among US allies, which was revealed during the Edward Snowden events, it seems that some officials are still under close watch by the NSA.

Among those is the prime minister of one of US' biggest allies -- Israel. According to a Wall Street Journal report, the White House decided to keep certain high-ranking officials under close watch, including Netanyahu and Recep Tayyip Erdogan, president of Turkey.

By Sead Fadilpašić -
Adobe Flash logo

Adobe Flash gets the final security patch of 2015

There’s nothing quite like kicking a dead corpse, and that’s basically what Adobe is doing with its once powerful product Flash.

Adobe has issued a security update for Flash, one which, according to it, addresses "critical vulnerabilities that could potentially allow an attacker to take control of the affected system".

By Sead Fadilpašić -
waving dog goodbye

The bad security habits enterprise IT needs to leave behind in 2016

2015 has played host to some significant cyber breaches. Experian, TalkTalk and Ashley Madison all fell foul of malicious attacks, and they weren’t the only ones. In 2016, businesses need to resolve to do better -- but the question is, how?

What bad security habits need to be given up to ensure a safer, more secure experience next year? What lengths could, and indeed should have businesses gone to this year in order to prevent some of the data breaches that occurred?

By Sam Pudwell -
digital_strategy_ideas

Clueless UK government wants you to help define its digital strategy

The UK government has been heavily criticized for the way it is attempting to control the way in which people use the internet -- blocking porn, unfettered surveillance and so on. The snooper's carter in particular has been the subject of much disapproval, and in an apparent bid to avoid further complaints, the government is now crowdsourcing ideas for internet policies.

In an article entitled UK Digital Strategy - the next frontier in our digital revolution (a document replete with language and references akin to an elderly parent talking about some aspect of modern culture they don't quite understand), Digital Economy Minister Ed Vaizey explains that he is looking for "ideas from public and industry on the UK's digital strategy".

By Sofia Elizabella Wyciślik-Wilson -
ST-TV_Blog_122415_R2-b

Samsung adds SmartThings and security to IoT TVs

The Internet of Things is the hot buzz-phrase right now and Samsung has an iron in the fire with SmartThings. Its line of products is also compatible with those made by other manufacturers -- that's the biggest catch with all of this, as not everything is compatible with all competing products.

Now Samsung is bringing its SmartThings platform to its own line of TVs and all 2016 models will offer built-in compatibility. This allows for control of your home right from the screen in your living room, or wherever you may have the product.

By Alan Buckingham -
cash money

Return of investment for cybersecurity: Can we put a number on it?

Almost eight years ago, Bruce Schneier wrote a great article about the problems of ROI calculation for cybersecurity spending within organizations. Since then, both annual spending on cybersecurity and the cost of global cybercrime have significantly increased.

Despite that organizations increased their information security budgets by 24 percent in 2016, many security officers still have to justify to their management every extra thousand spent on cybersecurity. Traditionally, Europe is more conservative than US, and many more European security officers are asked to reduce their initial cybersecurity budgets by removing some items or replacing them with less expensive alternatives.

By Ilia Kolochenko -
cloud key

Microsoft is backing up your encryption keys in the cloud, but you can prevent this

Microsoft, like many companies, ships some of its products with disk encryption and that's a good thing given the state of today's world. The vast majority of customers have nothing to hide, but they also don't wish to be watched by the prying eyes of governments and others.

However, it is being reported that the Windows maker is storing encryption keys in the cloud. While that doesn't necessarily mean a problem, it's also a bit scary because of the potential for what can go wrong -- a Murphy's Law scenario. This issue was first reported by The Intercept, which notes that your keys "may" be stored in the cloud -- not everyone's are.

By Alan Buckingham -
Ballot box

Dodgy database exposes details of 191 million US voters

If you've voted in a US election at some point in the last 15 years, there's a high chance that your personal details are now out in the wild. Security researcher Chris Vickery found a misconfigured database that exposes the details of no less than 191 million US voters.

The discovery was made a little over a week ago, and includes the names, addresses, phone numbers, email addresses, state voter IDs, and party affiliations of people registered to vote since the year 2000. The amount of detail contained in the database gives real cause for concern, and Vickery was shocked to find his own details were easily accessible due to a database misconfiguration.

By Sofia Elizabella Wyciślik-Wilson -
DDoS attack start

2016 will see the rise of DDoS-as-a-service

We've already seen a big increase in DDoS attacks in the past year and according to the latest predictions these are set to continue and become more sinister in nature as we move into 2016.

Security specialist Corero foresees a rise in 'Dark DDoS' attacks used as various smokescreens to distract victims while other attacks infiltrate corporate networks to steal sensitive data.

By Ian Barker -
wifi_security

How to view saved Wi-Fi passwords in Windows 10, Android and iOS

So many stores, service stations, coffee shops, pubs and so on offer free Wi-Fi that you probably have countless networks saved on your phone or laptop. Having a password saved on your computer is great, but how can you get the password so you can use it on your phone as well?

Rather than trying to hunt down a member of staff to ask, or hunting high and low for that tiny sign that shares the password, you can instead view the wireless passwords you have saved. Read on to find out how to retrieve these passwords in both Windows 10 and Android.

By Sofia Elizabella Wyciślik-Wilson -
north_korea_red_star

North Korea's Red Star OS leaves the government in control of computers

Based on Fedora Linux, you might expect North Korea's Red Star OS to be a secure operating system. It's not -- at least not by most people's standards. Like China, the socialist state is keen to embrace the power of the internet, but wants to retain control over is citizens. This s exactly what Red Star OS enables the government to do.

Germany researchers from the security company ERNW have probed Red Star OS, examined the code and determined that it is a home grown operating system that leaves the government in control of many aspects of its use, including encryption. It has been suggested that North Korea is paranoid that the west will try to infiltrate through software, but it is North Korean citizens that should be more worried.

By Sofia Elizabella Wyciślik-Wilson -
china_encryption_lock

China passes law requiring tech firms to hand over encryption keys

Apple may have said that it opposes the idea of weakening encryption and providing governments with backdoors into products, but things are rather different in China. The Chinese parliament has just passed a law that requires technology companies to comply with government requests for information, including handing over encryption keys.

Under the guise of counter-terrorism, the controversial law is the Chinese government's attempt to curtail the activities of militants and political activists. China already faces criticism from around the world not only for the infamous Great Firewall of China, but also the blatant online surveillance and censorship that takes place. This latest move is one that will be view very suspiciously by foreign companies operating within China, or looking to do so.

By Sofia Elizabella Wyciślik-Wilson -
punched_in_face_by_computer

Twitter says it is beating the trolls

Social networks were designed for people, and people mean problems. In particular, the likes of Facebook and Twitter have become havens for bullies and trolls, eager to prey on others online. Twitter has launched tools and education programs to combat trolling, and now the site says that it is winning the battle.

After making it easier to report abusive tweets and increasing the size of its anti-troll team, Twitter believes it is getting 'bad behavior' under control. As well as bullying of acquaintances and work colleagues, Twitter has also been used to attack celebrities, the gay community, religious groups, and more, with many people feeling driven from the site. It seems that the decision to take a very hands-on approach to troll tackling is starting to pay off.

By Sofia Elizabella Wyciślik-Wilson -
Load More Articles