Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don’t bank on mobile devices cite security concerns as the reason.
A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.
A new worm is infecting routers in order to commit social networking fraud, hijacking victims’ internet connections in order to “like” posts and pages, “view” videos and “follow” other accounts.
Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.
A research paper from Google has looked into the difficulties of standard ‘forgotten password’ personal information verification.
Casual dating website ‘Adult FriendFinder’ has been hacked, leaking data from as many as 3.9 million accounts, according to an investigation by Channel 4 News.
A new update to the Apple Store app for iPhone and iPad has bolstered its security features, adding two-factor authentication (2FA) and increased Touch ID support.
Should you trust that link? We Live Security runs down five quick security questions to ask before you click on a URL.
ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.
More than 1.1 million health insurance customers have been left vulnerable by a vast data breach, after criminals gained access to a CareFirst database in a “sophisticated cyberattack.”
Tens of thousands of HTTPS websites, mail servers and other internet services could be left vulnerable by a flaw that would allow criminals to snoop and modify encrypted data.
Researchers have developed a system to protect password databases, allowing hackers to believe they have cracked the file, only to be given fake credentials.
Google and Apple have signed a letter to President Barack Obama urging him to reject any proposal that would grant police access to encrypted phone data.