
UK govt wants real-time communication surveillance powers, courtesy of telcos
A leaked draft of proposed regulations shows that the UK government is after greater communication surveillance powers, and that in order to get them, it will legally require …

Healthcare breaches: Is your data at rest or at risk?
In 2016 healthcare breaches hit an all-time high (328), surpassing the previous record set in 2015 (268), according to Bitglass. Number of breaches Records of approximately …

Who’s responsible for secure Internet access?
Americans are divided on key issues around Internet access and responsibility for online privacy, according to AnchorFree. Over two thirds of Americans (68%) say Internet …

Bondnet botnet goes after vulnerable Windows servers
A botnet consisting of some 2,000 compromised servers has been mining cryptocurrency for its master for several months now, “earning” him around $1,000 per day. …

Critical RCE flaw in ATM security software found
Researchers from Positive Technologies have unearthed a critical vulnerability (CVE-2017-6968) in Checker ATM Security by Spanish corporate group GMV Innovating Solutions. The …

WordPress admins, take note: RCE and password reset vulnerabilities revealed
Independent security researcher Dawid Golunski has released a proof-of-concept exploit code for an unauthenticated remote code execution vulnerability in WordPress 4.6 …

Attackers exploited SS7 flaws to empty Germans’ bank accounts
Cyber criminals have started exploiting a long-known security vulnerabilities in the SS7 protocols to bypass German banks’ two-factor authentication and drain their …

World Password Day: Make the Internet a more secure place
Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …

European businesses not seeking help from the security industry ahead of GDPR
European research by PAC and Reliance acsn has outlined the challenges and concerns that security professionals across Europe are facing and how they approach the serious …

Majority of workers blindly open email attachments
The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …

Hacking industrial robots in today’s smart factories
It has been estimated that by 2018, approximately 1.3 million industrial robot units – mechanical multi-axis “arms” used for automating various operations – will …

GDPR requirements: Five high-priority actions
The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on May 25, 2018. Gartner predicts that by the end of 2018, more than …