In an exclusive for We Live Security, Jean-Ian Boutin, a malware researcher at ESET, shares his thoughts on the past, present and future of banking trojans.
From its relatively simplistic and niche origins, webinjects have advanced significantly in recent years to become a more sophisticated beast.
It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here’s what you need to know.
The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.
An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.
Is that really an appropriate level of security for computers that could be holding patients’ medical information?
The crowds at Comic-Con are a tempting target for cybvervillains, so get prepared with these top tips for keeping your data and devices safe.
Bitcoin has issued an urgent warning that very recent transactions could be invalid, due to a glitch with older mining software that could cause Bitcoins to be double-spent.
Cars which are capable of receiving instructions via the internet (such as software updates) are potentially more at risk of being hacked or meddled with than those which don’t.
The UK government has launched a new website designed to support victims of online abuse, while offering practical advice on how to report the abusers.
Cisco security engineers have disclosed that there is a single default ‘maintenance’ SSH key hardcoded into several families of Cisco security appliances.
A hacker has published an extensive list of Adobe Reader and Windows vulnerabilities based on his research into a relatively obscure area of font management.
A vulnerability found in Apple’s iOS and OS X devices could allow hackers to upload malware and steal passwords for services including Mail and iCloud