Match.com becomes the latest dating website to be targeted by cybercriminals, with experts finding that it has been subjected to a malvertising attack.
From its relatively simplistic and niche origins, webinjects have advanced significantly in recent years to become a more sophisticated beast.
A distributed denial-of-service (DDoS) attack puts the Greater Manchester Police website offline twice, with a Twitter user allegedly from Lithuania claiming responsibility.
The first unclassified cybersecurity Threat Report from the The Australian Cyber Security Centre has been released.
In an open letter to members of its own community, Bitcoin developers and contributors have called for greater cooperation over security and scalability.
An expert says that a popular Belkin router contains numerous vulnerabilities, making it extremely susceptible to attacks.
Last week, users of Lizard Squad’s DDoS-on-demand service were feeling the heat after arrests were made by UK police. This week, it’s the UK’s National Crime Agency which has found itself the victim of a denial-of-service attack.
It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.
British police have today announced the arrest of six people in connection with distributed denial-of-service (DDoS) attacks that attempted to bring down websites belonging to – amongst others – a national newspaper, a school and a number of online retailers.
The Ashley Madison attack could be one of the most notable instances of cybercrime in 2015. Here’s a timeline of the key events.
Introduction It might not have escaped your notice that I write quite a lot about support scams, an issue in which most commentators in the security industry take only sporadic interest and tend to regard as of only niche interest. (As when a scammer is damaging their brand or product in some way, for instance
Dolphin and Mercury Android browsers have major vulnerabilities, allowing for remote code execution and arbitrary reading and writing of files.
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here’s what you need to know.