Academics create new “anti-phishing” technology – electronic identity cards which allow secure access to websites, and which could simplify access for people less used to the Internet.
A hacker claims to have access to “the entire database of users on Twitter”, warning that “no account is safe”. He has leaked 15,000 account details via a file-sharing service as “proof” of his claims – although experts are skeptical.
Personal information for 14,000 U.S. Department of Energy employees has leaked in a data breach, according to the Wall Street Journal. It’s the second major breach the Department has suffered this year.
The bug allowed attackers to see any passwords using in a recent browsing session by performing a “memory dump”, and would have worked even if the user was not logged into LastPass.
Java has been – and still is – one of the more problematic issues security-wise. A website showing song lyrics from Golden Earring’s Radar Love shows off problems that can leave users at the mercy of Java attacks.
Apps with a hidden “dark side” could sneak past Apple’s approval process, according to researchers at Georgia Tech. The researchers proved this theory using a malicious app which was approved and downloaded via App Store in March this year.
A security researcher demonstrated an exploit to Facebook by using the bug to post directly to Mark Zuckerberg’s Facebook wall. Facebook responded by issuing a statement saying he would not be paid.
An outage which affected Facebook apps and developer accounts this week was caused by over-zealous attempts to disable malicious apps, the social network has admitted.
Most of us have faced cyber attacks sent by our best friends – Facebook “offers” they’ve clicked by accident, spamming everyone on their friends list, or Twitter stories they’ve shared without checking.
The New York Post has become the latest victim of a prolific hacking campaign targeting the social media accounts of worldwide media outlets – and SocialFlow, a social media company used by the Post and other media outlets, has also fallen victim.
A Texas family were horrified by an apparent hacker attack in which a criminal was able to spy on their two-year-old daughter and insult her through an internet-connected webcam.
A new paper aims to profile the victims most likely to fall for a phishing attack. But what is less clear is how you develop a profile while avoiding the pitfalls of stereotyping.
An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.
Two video plug-ins for YouTube hijack users visits to the site and insert extra adverts – some of which are being hijacked by “malvertisers”, sending users to fake adverts which attempt to infect their PCs.
Philips Hue lighting system is vulnerable to attacks which can cause a “perpetual blackout” in the homes of users, according to a security researcher. The Hue wireless system – on sale in Apple store – controls wireless LED light bulbs in the home via a wireless bridge, and can be controlled by iOS and Android
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed.
A security flaw has left all Android Bitcoin wallets vulnerable to theft, Bitcoin.org has warned. The vulnerability affects all Bitcoin wallets on the Android plaform.
Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.
Cybercriminals are turning to a new digital currency, Perfect Money, in the wake of the closure of the notorious Liberty Reserve, which was described as “the bank of choice” for cybercrime.