Users are warned to be on the look out for spam emails and reminded to never re-use passwords, as popular video-watching site suffers a data breach.
Don’t rest on your laurels. Patch your vulnerable computer systems now.
What car hacking researchers Charlie Miller and Chris Valasek have discovered is worrying enough. But it sends a shudder down the spine to even contemplate how much worse things could be.
At Comic-Con 2016, ESET’s Anna Keeve dives deep into the “real” world of Mr. Robot, has a VR adventure, and looks for cybersecurity clues in Elliot’s room.
Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.
It’s a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers… imagine if you were responsible for the security of Britain’s nuclear deterrent?
It’s one of the creepiest things you can experience on Facebook. You stumble across the profile of “another” user who appears to have stolen the details of your life – lock, stock and barrel. And they are spreading slurs about your character, and befriending your contacts…
In 1942 six mathematicians were selected to program a machine that would help the US army calculate complex wartime ballistics tables. They helped to create ENIAC – one of the world’s first ever electronic computers. They were also all women.
Parisa Tabriz may not be a household name, but it’s only a matter of time. We take a look at Google’s Security Princess, who is changing the face of tech.
Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices.
But what about your smartphone? Is there a patch for you, and can you get your hands on it?
Critical security patches have been released for Microsoft and Adobe products. Have you installed them yet?
A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.
TalkTalk talks numbers – revealing that “only 4%” of its users were affected by the hacking attack on its systems.
Organisations of all sizes need to do more to protect their social media accounts from being hijacked.
Next time your computer breaks down or appears not to be working right, consider what not to do before you call your techie for some help.
Good news – hackers hadn’t hijacked Microsoft’s Windows Update system. Bad news – users’ confidence will have been shaken again by Microsoft’s goof.
It’s time to update Flash once again, and don’t forget to reduce the attack surface by enabling “Click to Play”… or uninstall it altogether.
The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.
The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.