In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.
Cisco claims in its report that cybercrime is now a global, professional industry – and there is a worldwide shortage of professionals able to defend against such attacks, with new technologies in malware meaning that there is a shortfall of a million IT professionals.
The computer giant announced the change of policy in an official blog post in which it said that although XP was no longer “a supported operating system”, security updates would continue until July 2015.
Thousands of hotels have found that their listings on Google Maps and Google+ have been ‘hijacked’ – pointing instead to different sites, rather than the hotel’s own. At least 4,000 sites have been affected.
Starbucks has promised to update its mobile app – the most-used mobile payment app in America – after a security researcher found that it stored passwords in plain text, leaving users vulnerable to attack.
At CES 2014, the app was king – and more importantly, the appcessory – fridges, lights, appliances and gadgets built for app control. But with companies unveiling door locks controlled via app, should we applaud – or worry?
A secret technology which relied on radio transmissions has allowed the National Security Agency to spy on computers disconnected from the internet – a security measure known as an ‘air gap’, and commonly used to protect machines containing highly sensitive data.
Computer users often feel bombarded by warnings about malware – particularly in internet browsers, which often repeatedly warn about risky sites – but tricks used by cybercriminals can help stop this, a new paper claims.
Major international cyber attacks follow a pattern – and attacks such as Stuxnet, which targeted Iran’s nuclear plant can be predicted by a mathematical model, University of Michigan researchers have claimed.
Malicious software was installed in tills in Target stores across the U.S. and went undetected for weeks, the chain has admitted, harvesting information from the magnetic stripes on customer cards during transactions.
Read how to protect yourself if you’ve been shopping with credit or debit cards (and who hasn’t?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.
This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive traffic to advertisement websites by using various click fraud techniques, and thus earn money from these websites as an “advertiser”.
A survey of 22,762 consumers conducted by the British government found that less than half took the most basic steps to protect themselves online, the government revealed as part of a new campaign aimed at consumers and small businesses.
High-end retailer Neiman Marcus has admitted that thieves had accessed its systems and made unauthorized charges on customers’ credit cards over the holiday period.
Retailer Target has announced that the breach affecting the company was even bigger than thought – and 70 million credit card details may have leaked.
A new app, Snoopwall, could offfer Android users some protection against apps which listen to user data – and transmit it – a problem that plagues the operating system, by allowing users to monitor apps, and disable their ability to transmit or store data.
A tiny new iris-scanner which plugs into smart devices and PCs could eradicate the need for passwords entirely – and it offers a far higher level of security than fingerprint scanners, with a ‘false positive’ chance of just 1 in 2.25 trillion.
Patrick Garratt is a 15-year veteran of the gaming industry, having been behind the launches of major news sites such as Eurogamer and VG247 – but in the DIY, anything-goes world of PC gaming, even he still falls for a scam or two. Is it REALLY his fault, though?
Is there really anything new to be said about tech support scams? Unfortunately, the FTC tells us there is. Not only because people are still falling prey to this type of fraud, but because the scammers are still finding new approaches to harvesting their victims’ credit card details. Some quite interesting, sophisticated technical tricks are