Internet of Things devices from the likes of Apple, Fitbit and Samsung will be pushed to their limits this August at the DefCon 23 conference, where hackers have been invited to test the latest gadgets for possible exploits.
Just six percent of British employees have received training in dealing with phishing attacks, a survey has revealed.
The average ‘low-end’ cost of a major cybersecurity breach has more than doubled from £600,000 (~$917,000) to £1.46 million (~$2.2 million) in the last year.
The Home Depot has called upon a federal court to dismiss a lawsuit brought about by consumers claiming they were hurt by last year’s data breach.
The Supreme Court has reversed the decision to convict a Pennsylvania man who directed violent online threats at his ex-wife, citing intent as necessary legal grounds for conviction.
As many as 56 million login credentials may be at risk because of cloud services used incorrectly by app developers, according to new research from the University of Darmstadt.
With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?
At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
One of India’s most popular music streaming services, Gaana, was pulled offline after a hack resulted in a leak of data affecting more than 10 million users.
Irish businesses have been criticized for their IT security standards after it was revealed that a significant majority are not currently meeting the legal requirements.
An exploit has been discovered that causes iPhones and iPads to reboot when sent a string of malicious text.
Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.
Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway – even when limited reception is available.