CME, described by Bloomberg as the world’s largest futures trader, said in a statement that “to date” there was no evidence that the unknown attackers had affected trades on CME Globex, but customer information had leaked.
Embattled handset maker BlackBerry has faced another blow, after the company warned users of a security bug affecting the software used to link its BB10 handsets to PCs.
“Pinkie Pie”, an under-21 hacker won $50,000 at the Pwn2Own contest, as he used drive-by attacks to take over a Samsung Galaxy S4 and a Nexus 4, both of which run Android.
Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from Britain’s National Cyber Crime Unit, which is targeting small businesses with a spam campaign.
Microsoft has opened a new Cybercrime Center – a war room where the tech giant’s lawyers and security experts will use bleeding-edge technology and industry expertise to battle crime online.
Don’t let cybercriminals spoil your holidays! Our tips will ensure you don’t get fooled by the latest scams while you hunt down the best deals for your family.
Keypic uses an image – usually an advert, but it can be a single pixel, an animation, or anything the site’s administrator wants – and checks for typically “human” behavior. It’s already used on nearly 6,000 sites, and is available as a plug-in for WordPress and Drupal.
Half of the world’s 50 biggest banks have faced security incidents affecting their web applications. Fifteen per cent of those incidents were classified as “high” or “critical” risks, a new study has revealed.
Who is responsible for privacy and online safety on social networks? ESET asked Harris Interactive to poll American adults and found some interesting responses, positive advances in cyber-citizenship, but also some apparent disconnects.
Hackers have accessed full card details for at least 376,000 people in a cyberattack on a “reward scheme” company, Loyaltybuild – as well as phone numbers and addresses for more than a million others.
Facebook users who used the same email and password on their Adobe and Facebook accounts have been offered a helping hand by Facebook in the wake of the recent massive breach at Adobe, which leaked account data for 38 million users.
Did you see the recent story about police in England seizing a 3D printer suspected of producing parts for a weapon – a pistol in this case? Yes, the Greater Manchester Police Department was swiftly nipping hi-tech crime in the bud. The only problem: The poor unsuspecting “criminal” was printing out spare parts for a
More vulnerabilities have been discovered in a D-Link router, leaving the device vulnerable to attacks via its web interface – only weeks after the discovery of a “backdoor” in other D-Link devices.
One of the largest cyber ‘war games’ ever created tested thousands of banking staff across London’s investment banks against the ‘worst case scenario’ – a major cyber attack on stock exchanges.
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET’s official response.
American PC users are being hit with a new wave of Filecoder ransomware, which locks access to computers and demands $300 – with a ticking timer before files are locked forever, according to US-CERT.
A cyberheist targeting a bitcoin “bank” website has netted thieves more than 4,100 bitcoins, worth $1.2 million. The hack is among the largest thefts in the currency’s four-year history.
The system relies on users describing patterns of blots, then matching descriptions to patterns – and should be foil the automated programs used by cybercriminals, the researchers say.
Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?