Infosecurity News

Full Encryption Flaw Affects Half of All Android Phones
The flaw could allow someone with physical access to the phone to access all of the information and material on a device.

EU Adopts Cybersecurity Law with Reporting Mandates for Orgs
The first-ever European Union-wide rules on cybersecurity specify risk management and incident-reporting obligations for companies.

UK Security Biz Darktrace Pockets $65m in Funding
Vendor goes from strength to strength

Adwind RAT Resurfaces—with a Zero Detection Rate
This RAT is multi-platform and destructive, and being used in a series of targeted attacks.

EU Ploughs $500 Million into Cybersecurity R&D
Question marks over whether UK will benefit post Brexit

Global Firms Could Pull Data Out of Post-Brexit UK
CNS Group warns of ‘clearer lines of data sovereignty’

Chief Digital Risk Officer Predicted to Disrupt Business
More Chief Digital Risk Officers (CDROs) are now being appointed to hold strategic roles which combine digital expertise with high-level management skills.

Security the Winner as Airlines Plan Big Investments
Decision comes as many also plough money into IoT projects

Highly Organized Chinese 'Yingmob' Rakes in $300K Monthly from Mobile Malware
The cybercriminals behind Hummingbad and Yispecter have 25 employees staffing four groups for developing malicious components.

Meet Hummer, the No.1 Mobile Trojan in the World
Hummer infected nearly 1.4 million devices per day during the first half of 2016, and is spreading worldwide.

Large Orgs Likely to Have at Least One Malware-Infected Device
Android devices twice as likely to be infected compared to iOS devices

Dating Site Muslim Match Suffers Data Breach
Blackmail warning as private messages are exposed

Top Russian Site Exposes Millions to Info-Stealing Malware
The EK first drops SmokeLoader, a trojan which downloads other components like click-fraud and credential-stealers

hack/secure Investment Syndicate to Fund 100 Cyber-Startups
hack/secure unites 25 cybersecurity entrepreneurs to fund 100 U.S.-based cybersecurity companies over the next three years.

Faster Response Times Needed to Combat Cyber Threat
New research from the BCI has revealed substantial differences among organizations when it comes to response times following a cyber-breach

China’s Censorship Tsar Steps Down
But it will be business-as-usual in Beijing

World-Check Terror Blacklist Leaked Online
Database used by banks and governments found on public internet

Malware's Role: Wildly Overstated as an Info-Stealing Tool
99% of post-intrusion cyberattack activities use standard networking and IT tools.

Official UEFA Euro 2016 App Leaks User Data
User names, passwords, addresses and phone numbers are being transferred over an insecure internet connection.

9.2 Million More US Healthcare Records Go Up for Sale on the Dark Web
The plaintext 2GB database has names, addresses, emails, phone numbers, dates of birth and Social Security Numbers (SSNs).



