More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a new survey by the Economist Intelligence Unit – despite 77% of companies having faced such incidents in the past two years.
Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.
A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization – but it’s a malware-laced scam.
A new wearable authenticator built to be the key to “everything” will be designed by some of the hottest new talents in wearable technology, including the creators of the Neptune Pine smartwatch – one of the only wearable devices to work independently of smartphones.
Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially crafted” Rich Text Format file allowed attackers to remotely execute code on the victim’s machine.
Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.
A post promising a video of a plane landing on water has been circulating on Facebook, with a title suggesting that it contains news footage of the rescue of passengers on board the missing flight MH370 – but there is no video, and it’s a criminal scam.
A hidden backdoor in the modified version of Android run by nine Samsung Galaxy models could allow attackers to spy remotely on user data – and even snoop on users using hardware such as the GPS system, camera and microphone.
Two-thirds of top e-commerce sites still accept the weakest passwords, such as “123456” and “password” without warning users that these are the very first passwords hackers will use in attempts to breach their accounts, according to a new survey.
The emerging ‘internet of things’ raises big security questions, and vulnerabilities in connected devices such as ‘smart’ fridges may force companies to work together in a way never previously seen, according to Microsoft’s Jan Neutze.
Hit messaging app Whatsapp may not be as secure as its 450 million users believe – after an independent security consultant revealed a loophole which rogue app developers could use to steal Android users’ entire Whatsapp history.