Cybercriminals could buy their way into your computer for less than a dollar, a new study has found. The study, led by Nicolas Christin at Carnegie Mellon University, examined how much money they would have to offer home users to install software onto their computers or other devices.
The top three teams from the fifth annual Mayors’ Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North America for five days of hands-on security training and lectures from IT experts, law enforcement, and career advisors.
Graduation is a great time to review your social media profile. Don’t let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.
Newly stolen credit and debit card details, from cards used in P F Chang’s China Bistro, a nationwide American chain of restaurants, went on sale on an underground website this week at a site best-known for selling off the details of victims of the Target data breach.
The Bank of England weathers an average of eight cyber attacks including malware-laced “spear phishing” campaigns per week, according to Chief Information Security Officer Don Randall.
A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.
In a world-first case, biometric facial recognition software has been used to convict an armed robber, with a Chicago robber “matched” from CCTV footage to a mug shot, and sentenced to 22 years in prison.
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
A vulnerability in the way interactive apps work on many so-called Smart TVs could allow teams of relatively unskilled hackers to attack thousands of devices at once, a team of Columbia University researchers claims in a new paper.
Do you know what ransomware is? Do you know a filecoder from a lockscreen?
Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.
Even smartphone and tablet users who choose a four-digit PIN to protect their device are vulnerable to “shoulder surfers” glimpsing the code and using it later – but an older form of password could come to the rescue…
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.
On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.