Wearable devices bring us a whole world of technological innovation, yet at the same time it appears as though they also bring with them a serious security risk.
The final instalment in Cameron Camp’s security-focused coverage of CES 2016, looks at the future of drones. It’s all about augmented reality.
Robert Lipovsky, a senior malware researcher at ESET, offers his expert insight into the recent discovery of BlackEnergy malware in Ukrainian energy distribution companies.
Highlights from the last seven days in information security include the return of the BlackEnergy trojan and security insights from CES 2016.
The app-based taxi company Uber has agreed to pay a $20,000 penalty for poor data security practices and to reform its privacy policies.
It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft’s flagship operating system is going to be on the minds of administrators for 2016, says ESET’s Aryeh Goretsky.
Time Warner Cable, one of the biggest cable telecommunications companies in the US, has revealed that some of its customer data ‘may have been compromised’.
Once described as ‘Britain’s greatest online fraudster’, reformed Tony Sales has been hired by West Midlands Police in the UK to help tackle ongoing cybercrime.
Deniss Calovskis, one of the men found to be responsible for the Gozi trojan, is free to return home to Latvia after being sentenced to time served.
A number of leading shipping organizations have developed a set of cybersecurity guidelines to help the industry combat this growing threat.
The recent attacks on the electrical power industry in Ukraine are connected to attacks on the media and to targeted cyber-espionage attacks against Ukrainian governmental agencies.
Microsoft has revealed that it will notify its users to inform them that their account has been targeted or compromised by a state-sanctioned cyberattack.
The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014, was also active in the year 2015.
Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little is known about this tactic. This feature discusses some key aspects.