Security
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
The information could help American law-enforcement authorities to identify and locate perpetrators who used the platform to plan US Capitol violence
Ensono: Users expect high speed and availability, and outages can severely impact brand reputation
Oliver Presland, VP, Consulting Services Portfolio Ensono discusses the impact of the pandemic on user expectations and the security landscape
High Court rules against bulk hacking by police and intelligence agencies
Privacy International celebrates High Court win
Hackney Council stolen data published on dark web forum
Pysa ransomware group has claimed the responsibility for the cyber attack launched last year
WhatsApp will share more user data with Facebook
WhatsApp says the move will enable it to better integrate with other Facebook products and services, but there are privacy concerns
Nissan suffers data leak via misconfigured Git server
The exposed data included source code of Nissan mobile apps and diagnostics tool
US intelligence confirms actor 'likely Russian in origin' behind the SolarWinds hacking campaign
The operation appears to be an intelligence gathering effort, rather than an act of cyber warfare, agencies say
The FT goes 'cloud-only', using AWS and GCP
Greg Cope, technical director for enterprise services, and interim CTO Mark Ridley discuss the successes and pitfalls along the way, as the organisation managed to ditch all of its data centres during the global pandemic
ElectroRAT malware used in extensive operation to extract funds from cryptocurrency wallets
Cybercriminals employed three fake cryptocurrency-related apps to trick users into downloading the malware on their systems
DevSecOps: the art of bringing security into the fold
QA and testers need to be first-class members of the team
Awards winner The Keyholding Company blends physical and cyber security
The Keyholding Company built a totally custom service delivery platform with partner Haulmont – and the benefits have been clear
SolarWinds hackers accessed Microsoft source code in a number of repositories, the company says
But no changes were made to the code, Microsoft asserts
Cisco acknowledges some of its systems compromised by SolarWinds malware
But none of the company's products or services were affected, Cisco says
State actors hacked iPhones of dozens of Al Jazeera journalists using Israeli spyware
The spyware exploited an iMessage vulnerability in iOS
Alibaba criticised for racial profiling through facial recognition
The company says such features were only used 'within a testing environment'
Microsoft confirms it found compromised SolarWinds code on its systems
But the major target was the US government
US nuclear weapons agency breached in cyber attack
CISA has warned about the difficulty of completely ridding the government network of malware
Apple defends iOS privacy changes against Facebook's accusations
Facebook has taken out full-page ads in the US press claiming opt-in permissions will hurt small businesses
FireEye, Microsoft identify 'killswitch' to remove malware impacting SolarWinds Orion software
But hackers may still have other means to retain access to victim networks, security experts warn
The year's biggest cyber security stories
Bears, scares and ransomware
SolarWinds says fewer than 18,000 customers installed malware-laced Orion software update that led to US Treasury hack
Update to remove malware planned for release today
Hackers compromise Subway UK's marketing system to deliver TrickBot malware
No evidence of guest accounts having compromised by hackers but sandwich firm advises anyone who may have downloaded malware to perform a thorough scan of their machine
US government confirms cyber attack on Treasury and Commerce departments by state-backed hackers
By compromising SolarWinds monitoring software attackers gained unrestricted access to internal email systems of federal agencies
Microsoft warns of Adrozek ad-injection campaign affecting all major browsers
Adrozek adds browser extensions which connect to the attacker's servers, modifies browser settings to inject ads, and disables security features