Enormous network of hijacked zombie servers threatens to batter everything in its path. John Leyden Cybercrooks have built a network of compromised Linux servers capable of blowing websites and other…
Month: September 2015
Cyber attacks: How advisers can cut the risk
Cyber security is a growing issue for all businesses, including financial advisers. Here, James Thompson assesses how IFAs can protect themselves and their clientsÂ… Author: James Thompson: In today’s digital…
How hackers could steal your voice to access your bank account
Silence is goldenÂ… By James Billington Hackers could be looking to steal your voice and use it to carry out online theft after researchers discovered voice-based user authentication systems are…
10 Password Managers For Business Use
Beyond helping end users keep track of their logins, some password managers can integrate with Active Directory and generate compliance reports. Sara Peters Password manager software makes promises that many…
Mobile advertising DDoS JavaScript drip serves site with 4.5bn hits
Once-theoretical attack vector appears fully-formed on CloudFlare’s doorstep. Darren Pauli CloudFlare has turned up an unusual form of denial-of-service attack: mobile advertisements that are pumping out around 275,000 HTTP requests…
Medical devices vulnerable to hackers
Shock that devices can be found online by hackers. Thousands of critical medical systems, such as MRI machines, are available for hackers to access online, according to researchers. Some 68,000…