Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.
New evidence has emerged that the new iPad will have fingerprint security built in, as found on the Apple iPhone 5S.
Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.
Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.
Young people are seriously worrried about connected gadgets when it comes to privacy – worrying that ‘connected’ gadgets such as Smart TVs could give away more data than they are comfortable with, according to a new survey.
Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives”. The attack appeared to have come via a third-party service connected to Twitter.
Google is offering full refunds to buyers of the Virus Shield app which briefly topped the Android charts last week – but turned out to offer no protection whatsoever.
The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.
When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.
Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android smartphones.
A new, terrifying weapon is in the hands of hackers – the ability to stop a toilet flush working. We look at 2014’s silliest hacking predictions of gadget doom.
Google’s popular Chromebook laptops could soon do away with passwords entirely with a new system where simply bringing a phone near the laptop opens up the OS.
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal information – in this case, private information on Canadian taxpayers.
Hard drive specialist LaCie has admitted a data breach that exposed customer emails and passwords – and the attack went undetected for an entire YEAR. Potential victims have been notified, but the scale and damage of the attack are yet to be assessed.