Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.
The premium email provider FastMail has revealed that a cybercriminal has launched multiple DDoS attacks on its systems and made a ransom demand.
The free version of Ammyy’s remote administrator software were being served a bundle that contained an NSIS installer used by the gang behind Operation Buhtrap.
The cost of last month’s cyberattack on TalkTalk is likely to top £35 million, the company’s CEO, Dido Harding, has admitted in an interview.
Comcast resets customer account details after it found out that information was being sold on the dark web.
One of the biggest concerns parents have about the internet is the sites their children are browsing. Parental control tools can help allay this worry.
A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime.
CyberInvest is the latest government initiative designed to boost the country’s leadership in cybersecurity.
This week’s roundup of the past seven days includes a interesting piece on Industrie 4.0, Schrödinger’s antivirus, proposals to weaken encryption and much more.
TalkTalk talks numbers – revealing that “only 4%” of its users were affected by the hacking attack on its systems.
In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.
Banks in the UK and US will be tested on how capable they are in coordinating a transatlantic response to a cyberattack.
The question of antivirus software being dead is one that doesn’t seem to go away. Why is that? Distinguished ESET researcher Aryeh Goretsky explores.
The UK government is to put forward proposals that will require organizations to limit the effectiveness of data encryption, arguing it weakens security.
A US man who posted an advert on Craigslist requesting the services of a cybercriminal has been handed a two-year prison sentence. He wanted fines he owed to be wiped clean.
Time after time we have experienced revolutions in our societies, in the way we work and thus in the Industry. In the past we have been through several Industrial Revolutions and now it’s seems to be the time for another.