Malicious apps are multiplying rapidly in Google’s Play store – where a survey found that the number of malicious apps had grown 388% from 2011 to 2013, according to Risk IQ.
It’s not just fake tech support: call centre cold-callers are operating various kinds of insurance scams, too.
Smartphone dating app Tinder revealed more about its users than they might have wished over a period of several months last year – revealing their location to other app users to an accuracy of around 100 feet, according to The Verge’s report.
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.
The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print magazines could pose a risk to smartphone users, Australian researchers at Murdoch University have warned
Belkin’s WeMo home automation systems contain multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system – for instance, blacking out lighting in a home, or even starting fires, researchers have claimed.
Google has bought a company offering a new form of two-factor authentication – using “silent” sounds played via PC and smartphone speakers to verify a user is who he or she claims to be
Mac OS X is a slick, easy-to-use operating system with an impressive record on security – and basic malware detection built in since 2009’s Snow Leopard update. While Macs have seen sales slowing in the past year, due largely to losing market share to their own stablemates, iPads, and other mobile devices, they’re a growing
Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers – even ones protected by passwords – it’s still not clear how many are infected – or if the malware has a purpose beyond simply spreading.
Could places, not phrases, be the basis of secure passwords. UAE researchers have created a system for creating complex passwords using facts about a user’s favourite place – and claim it can foil ID-theft attacks.
Security expert Graham Cluley takes a look at the Kickstarter hack, and discovers there’s more to think about than just changing your passwords.
A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.
The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.
Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.
If your system administrator looks a little frazzled this week, be nice to him or her and don’t grumble too much about the photocopier being jammed. It may be that they have more serious issues on their mind.
Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.