A tool for cybercriminals that promises to use stolen credit card details in a more ‘human way’ to bypass fraud detection has been found on sale for as little as $180, according to The Register. “Voxis Platform” is described as “advanced cash out software”, which will help cybercriminals earn “astronomical amounts” by mimicking human behavior on different
National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).
One of the most popular and useful security functions of mobile handsets can be turned against the owner.
IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?
Google has outlined the enhanced security credentials of the upcoming Android 5.0 – nicknamed Lollipop – in an official blog post.
Job centers across the United Kingdom are due to get a technological makeover, courtesy of biometric and signature recognition pads, reports IT Pro Portal.
Fidelity National Financial has been contacting an “undisclosed number of individuals”, notifying them that a selection of personal data may have been exposed after some of the Fortune 500 company’s employees had their email accounts targeted by a phishing campaign, SC Magazine reports.
Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,
A study by Microsoft has revealed that 42 percent of Americans face ‘weekly or daily’ attacks by cybercriminals trying to access their computers, Network World reports.
An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this “would not prevent copycat attackers from the more than 100 exit nodes in operation.”
A selection of rival privacy conscious Tor routers have appeared on crowdfunding sites after the Anonabox was surprisingly pulled just days after smashing its modest funding targets.
Popular microblogging platform Twitter is taking bold steps to try and put an end to the password as we know it, according to Sky News.
There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.
Tips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.
Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops – from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.
An army of the undead, wreaking havoc on the Internet – it’s a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.