Criminals seeking to kill endangered species and sell trophies online are turning to increasingly hi-tech methods to target their prey – including cyber attacks built to steal information on where animals patrol, according to the World Wildlife Fund’s Wildlife Crime division.
The attackers were able to steal all the bitcoins stored in the bank’s “hot wallet” – the portion of its funds on computers accessible via the internet – due to a transaction flaw in its code.
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.
An emailed warning and enforced password reset sent out to Twitter users on Monday due to a supposed compromise of their accounts provoked much discussion among site users – before the company admitted the reset had been initiated by mistake.
More than 300,000 wireless routers worldwide are under the control of an unknown group of cybercriminals, who have made malicious changes to the devices’ settings – and the attack is part of a “growing trend”, researchers claim.
Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?
Bitcoin exchange Mt Gox has admitted that nearly $500 million in bitcoin has “disappeared”, in a new statement posted online – as chunks of computer code have appeared on Pastebin which appear to be part of the backend for the site.
Yet another innovative tech support scam, using Netflix phishing to get remote access to the victim’s system.
Networking giant Cisco has launched a “grand challenge” to invent a security solution for the “internet of things” – a broad term used to describe connected devices from industrial equipment to cars to smart home appliances.
CIA Director John Brennan says that connected appliances and networked vehicles will make the agency’s job harder – with more systems to protect, and more platforms which could be used to launch attacks.
Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.
Boeing has unveiled a smartphone fit for James Bond – the Boeing Black, which can connect to satellites and secret government telecoms networks, will self-destruct if tampered with, deleting all data and rendering the device useless.
A virus designed to infect Wi-Fi networks can spread through cities “as efficiently as the common cold spreads between humans”, researchers at the University of Liverpool have found.
Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.
Mark Brooks of OnlinePersonalsWatch works with many online dating sites – and says that all of them are plagued by fake profiles, scammers and criminals looking for money, not love. A few simple steps can help ensure you don’t fall for a fake…
Mastercard is piloting a scheme where smartphone GPS systems are used to authenticate purchases for travellers – which could spell an end to the frustrating and common experience where cards are blocked instantly when used abroad.
Pirated versions of popular Mac apps, spread via torrent sites, try to infect your computer with malware… and steal Bitcoins.
Businesses in America have increased security spending after the wave of high-profile cyber attacks late last year, including the Target breach – and most U.S. companies expect such attacks to increase over the next two years.
Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to