A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.
In a world-first case, biometric facial recognition software has been used to convict an armed robber, with a Chicago robber “matched” from CCTV footage to a mug shot, and sentenced to 22 years in prison.
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
A vulnerability in the way interactive apps work on many so-called Smart TVs could allow teams of relatively unskilled hackers to attack thousands of devices at once, a team of Columbia University researchers claims in a new paper.
Do you know what ransomware is? Do you know a filecoder from a lockscreen?
Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.
Linkedin is the worlds largest professional network, but leaving your personal information open to the general public may expose you to cybercrime. Follow these top tips from We Live Security to help keep your account secure.
Even smartphone and tablet users who choose a four-digit PIN to protect their device are vulnerable to “shoulder surfers” glimpsing the code and using it later – but an older form of password could come to the rescue…
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.
On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.
The hi-tech research wing of the US military DARPA (Defence Advanced Research Projects Agency) is to offer a $2 million prize offered for a fully automated defense system – a computer that defends itself without human intervention.
In an embarrassing breach of security, the passport numbers of members of the England Football squad have been accidentally tweeted out by the team’s official sponsor.
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.
Convincing-looking emails where the victim is directed to click on a Dropbox link to download a supposedly unpaid invoice (and other classic phishing tricks) are circulating widely on the internet.
FBI names as “Most Wanted” the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and Cryptolocker schemes, as law enforcement agencies crack down on cyber crime infrastructure.
It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.
The recent security breach at eBay has caused wide spread concern that personal information has been leaked. There is no need to panic, but by following these basic steps your information will be a lot more secure.