Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks – but there aren’t enough experts to go round.
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities – and discuss the evidence that Xunlei Networking Technologies is implicated.
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.
For many PC users USB keys must seem like a relic of a bygone age – but for security-conscious workers, keys can be a very safe place for data. Porsche and Lacie’s new USB offers password-protected storage for sensitive files.
Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.
Bounty hunting just got serious – Microsoft has paid out $100,000 to a security researcher in a single “bug bounty” for uncovering a weakness in the preview version of Windows 8.1.
Smartphone users want more protection for the data on their cellphone – and are perfectly comfortable being fingerprinted if that’s the best option, accoriding to a new survey commissioned by PayPal.
Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure – and action is needed to ensure nations stay safe, the EU’s cyber security agency ENISA said today.
The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the Ponemon Institute. Each cyberattack now costs companies nearly $1 million to resolve, on average – and the annualized cost to a sample of U.S. organizations was $11.56 million.
Apple’s fingerprint sensor has drawn a huge amount of attention (and hack attempts) ever since it launched on iPhone 5S – but it seems Android users will get their own fingerprint protection shortly.
A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of banks, markets and payments systems against a simulated “major” attack by cybercriminals.
The human voice can be used as a secure, quick way to identify people, claims Bretislav Beranek of voice-recognition software company Nuance. Beranek claims that voice ID is gaining ground – and could even be used to authenticate users for credit cards.
Plugging your smartphone in to charge up could soon offer an alert that you’ve contracted malware – with a new charger that lights up when it detects malicious software. For businesses, it could be a “last line of defense” against employees bringing infected devices to work.
Internet Explorer users will be a great deal safer from Tuesday onwards, after Microsoft announced a patch for a vulnerability that has been exploited by attackers “for months” according to some reports.
Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code for its Acrobat software, used to make and read PDF files. Adobe also admitted hackers had stolen data on 2.9 million customers.
Finding vulnerabilities can be a profitable business – even if you work for the right side of the law. Last month, Facebook paid out $12,500 to a researcher for finding a bug – this month, Yahoo! paid out … $12.50.
An exploit for a vulnerability which affects all versions of Microsoft’s Internet Explorer has been released as a module for the popular penetration testing tool Metasploit – sparking fears of a new wave of attacks.