Amazon has reportedly reset a number of customer passwords, causing some concern as Black Friday and Cyber Monday are just around the corner.
When discussing banking trojans these days, Dridex is the one that everybody seems to be talking about the most. This trojan has inherited the popularity of the ancient Zeus trojan and is one of the biggest threats that we can find right now, in constant evolution to become more efficient.
Black Friday and Cyber Monday promise to offer some fantastic deals at low prices. But it’s also a time of year when cybercriminal scams are aplenty. Here’s what you should do to do to shop safely.
Dell has confirmed that a root certificate vulnerability that is present on some of its laptops and computers, means they can be exploited by cybercriminals.
The newly launched Cyber Security Academy in the UK will deliver comprehensive solutions and insight to all types of sophisticated cyberattacks.
Get up-to-date with the latest happenings in information security with our review of the past week.
Instagram’s new API policy makes it a lot harder for third party apps to gain access to its feed. News of this comes on the back of a malicious app harvesting its user’s details.
British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold pronouncements about the UK’s willingness to engage in cyberwarfare to defend itself.
Apple’s Tim Cook has said in an interview with the Irish Independent that the idea of introducing backdoor access into encryption is ‘firmly off’ its agenda.
Not quite sure what were the most interesting and intriguing information security stories of the past week? Not to worry – the security review has you covered.
Although it’s far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.