East Midlands Regional Cyber Crime Unit

133 Added | 4 Magazines | 18 Followers | @EastMidland6uhi | The Regional Cyber Crime Unit (RCCU) is part of the East Midlands Special Operations Unit (EMSOU). The RCCU investigate those responsible for the most serious incidents of Computer intrusion, Distribution of malicious code and Denial of service attacks. Its hoped our magazines will help protect you against cyber crime and make your online profile more secure.

Facebook moves to encrypt the emails it sends users

Facebook announced that it’s introducing an experimental new feature that lets users add OpenPGP public encryption keys to their profiles so that …

Google reassures users on privacy and security

Google has created a hub to manage privacy and security settings in one place as well as a website that answers key questions about how Google stores …

Facebook Messenger no longer tracks your location by default

Good news privacy fans – Facebook Messenger will no longer track and make your location available by default.<p>Instead, to share your location, you …

WhatsApp can be hijacked – keep an eye on your devices!

Facebook’s WhatsApp messaging service is insanely popular.<p>In fact, in January, it was the most popular messaging app on the planet, with more than …

POC Shows Mac OS X UEFI Attacks Are Possible; What Does This Mean for Mac Users?

A critical Mac vulnerability was discovered by OS X security researcher Pedro Vilaca last week. According to his research, any attacker can disable …

Information Security

‘Evoltin’ POS Malware Attacks via Macro

<i>This post was written with the invaluable assistance of my colleague Rakesh Sharma.</i>Over the past couple of months McAfee Labs has seen an increase in …

Cybersecurity

Snapchat steps up its security with login verification

Snapchat is hugely popular with teens and young adults as a way to send short-lived photo and video messages, but it hasn’t won many fans in the …

Google Releases Security Update for Chrome

Original release date: May 19, 2015<br>Google has released Chrome version 43.0.2357.65 for Windows, Mac, and Linux to address multiple vulnerabilities. …

Google

Free Ransomware Decryption and Malware Removal ToolKit

A security researcher has compiled a ransomware removal and rescue kit to help victims deal with ransomware threats and unlock encrypted files …

Malicious Minecraft apps affect 600,000 Android Users

So you love <b>Minecraft</b>? You might want to be very careful before downloading the cheats for the popular Minecraft game from Google Play Store.<p>Nearly <b>3</b> …

Cyber security to be included in new GCSE curriculum

Exam board OCR has announced that cyber security skills will form a large part of the recently relaunched computer science GCSE in the UK.<p>Former …

IC3 urges social media users to beware: scams and fraud are surging

Research from the Pew Research Center shows that 69% of US adults are leery about how their personal data will fare once it’s on social media.<p>Superb! …

Apple Safari Browser Vulnerable to URL Spoofing Vulnerability

A serious security vulnerability has been uncovered in Apple’s Safari web browser that could trick Safari users into visiting a malicious website …

Dropbox gets top marks for security

The file-sharing cloud provider Dropbox has achieved ISO 27018 from EY CertifyPoint, “an important global standard for privacy and data protection in …

Cyber Security News

What's New Here?Subscribe to RSS feed<p>Credit monitoring agency Equifax has revealed that it was the victim of a major cyber security breach in March. …

Newsletters - Newsbites

SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during …

How to secure your baby monitor

Two more nurseries have been invaded, with strangers apparently spying on parents and their babies via their baby monitors.<p>This is nuts. We’re …

Poor investment choices hurting cyber security

Poor choices by IT professionals when it comes to selecting cyber security solutions is meaning these defences are often falling short of the …

Google Releases Security Update for Chrome

Original release date: April 29, 2015<br>Google has released Chrome version 42.0.2311.135 for Windows, Mac, and Linux to address multiple …

Google Chrome

Nepal Earthquake Disaster Email Scams

Original release date: April 30, 2015<br>US-CERT warns users of potential email scams citing the earthquake in Nepal. The scam emails may contain links …

Identity Theft

Apple Releases Security Updates for Safari

Original release date: May 07, 2015<br>Apple has released security updates for Safari to address multiple vulnerabilities. Exploitation of some of these …

OS X

Microsoft Releases May 2015 Security Bulletin

Original release date: May 12, 2015<br>Microsoft has released 13 updates to address vulnerabilities in Microsoft Windows. Some of these vulnerabilities …

Security

Adobe Releases Security Updates for Flash Player, Reader, and Acrobat

Original release date: May 12, 2015<br>Adobe has released security updates to address multiple vulnerabilities in Flash Player, Reader, and Acrobat. …

Adobe Flash

Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird

Original release date: May 12, 2015<br>The Mozilla Foundation has released security updates to address vulnerabilities in Firefox, Firefox ESR, and …

Firefox

Lenovo: researchers find 'massive security risk'

<b>The Chinese PC manufacturer Lenovo has been accused of running a "massive security risk" after researchers found flaws in its software.</b><p>Three vulnerabilities could be exploited to install malware on users' systems or to hand attackers a measure of control over them, it was reported.<p>Lenovo …

Information Security

Beware of spam emails pretending to be from Apple iTunes

<b>Action Fraud and the National Fraud Intelligence Bureau (NFIB) have been made aware that there are currently a number of emails being sent out that</b> …

Identity Theft

Breaking Bad ransomware

Author:<p>Published<p>in Malware, Ransomware 2<p>Sometimes malware authors leave clues in their code which might reveal something about themselves.<p>In the …

Spearphishing: A New Weapon in Cyber Terrorism

Introduction: Spear phishing attacks<p>Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack …

Dropbox Launches Bug Bounty Program

<b>Dropbox is the latest major company to turn to the power of the hacker community in an effort to ensure that its services are vulnerability-free.</b><p>The …

Researchers Keep Finding Bugs in Google’s Password Alert Extension

<b>Researchers have identified several ways to bypass Password Alert, an anti-phishing extension for Chrome launched last week by Google. The search</b> …