Police have arrested a man who allegedly hacked into computer systems and stole unfinished versions of songs from Madonna’s upcoming “Rebel Heart” album.
The Syrian Electronic Army strikes again. Are you using two-factor authentication? You should be.
Lizard Squad failed to encrypt its database of LizardStresser’s registered users – storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.
The end of mainstream support for Windows: Don’t repeat the mistakes of the past, and be prepared. Especially if you’ve only just got rid of all the Windows XP computers in your company.
A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.
Twitter and YouTube accounts run by the US military’s Central Command are hijacked by hackers claiming to back Islamic State.
Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.
The attack which knocked the PlayStation Network (PSN) and Xbox Live offline over Christmas appears to have been a publicity stunt, designed to gain notoriety and draw attention to the hacking group which has claimed responsibility – Lizard Squad.
Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age – long before Peter Jackson turned J R R Tolkien’s middle-earth fantasy books into a series of blockbuster movies.
Barack Obama promises that the United States will respond to the Sony hack, and North Korea drops off the internet. Is there a connection?
Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.
IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?
There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.
Make sure you are running a half-decent browser, don’t ignore browser security warnings, and enable two-factor authentication.
That appears to be the lesson to learn from the latest attack on Chinese internet users.
Yesterday, security researcher Jonathan Hall, of a company called Future South Technologies, accused Yahoo of having suffered a serious security breach via the recently discovered Shellshock vulnerability in Bash.
Newly weds George Clooney and Amal Alamuddin supplied guests with “burner phones” to prevent photographs from falling into the hands of hackers and the tabloid press.
Thousands of Facebook addicts are feverishly sharing a “news report” claiming that from November 1st you’ll be paying $2.99 every month to access the site.
With iOS 8, you can – for the first time – switch your Safari browser’s search engine to alternatives such as DuckDuckGo. Find out why you might want to and, in fairness, why you might NOT want to…
Online criminals are spamming out messages claiming that invoices are overdue. But attached to the emails are .ARJ files containing a malicious payload – don’t allow your computer to become infected.