Sign up to our newsletter
The latest security news direct to your inbox
If intelligence and law enforcement agencies have a genuine need to spy upon some communications then it should not be via a backdoor that could put millions of innocent, law-abiding users at risk.
A single email wiped $300 million off the value of an Australian mining company, after an environmental activist, Jonathan Moylan and sent a press release to media organizations.
Victims of the notorious attack against Sony’s online gaming service and associated websites in 2011, which exposed details for up to 77 million subscribers, are to be offered $15m in digital goods as compensation.
Using free cloud application hosting can allow an attacker to create a “free supercomputer” according to The Register’s report – used to mine cryptocurrency, researcher Oscar Salazar warns.
The European Central Bank has revealed that information including email addresses and contact data has leaked in a data breach – and that the unknown attackers demanded “financial compensation” from the bank in return for not releasing the information, according to the BBC’s report.
Almost everyone now has a Facebook account where posts and photos are frequently shared. However keeping track of what is posted can sometimes be a problem. Follow these 5 simple tips to get rid of content you no longer wish to share.
Ebay’s online ticket resale service Stubhub fell victim to a cyber-scam where a “global gang” used 1,600 hacked accounts on the service and bought and resold tickets, laundering $1m through European banks.
The developers of the Tor online privacy service are fixing a weakness which could have exposed the identities of hundreds of thousands of users of sites around the world.
Account hackers and thieves who loot magic weapons, armor and hard-won game currency from players in massively multiplayer titles such as World of Warcraft should face the same sentences as real-world thieves, a politician has suggested.
Tesla’s Model S has been hacked to make the doors and sun roof open while the car is in motion – and the researchers behind the attack were able to control the systems remotely.
Given the ‘nightmare’ that is password management, is Microsoft right to say that it’s sometimes OK to re-use the same memorable password on several sites?
Criminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically tries to break into PoS machines, called Win32/BrutPOS.A.
A new project aims to protect homes and small businesses from the security failings of Wi-Fi routers, a problem which has repeatedly hit the headlines over the past year.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Over the past few years, Comic-Con has had over 130,000 attendees, and those attendees tend to be very digitally literate – so that means we will probably see double that number of connected devices – laptops, tablets, smartphones and perhaps even tricorders.
A new kind of web tracking tool bypasses the protections privacy-conscious web users rely on and is already being used to track users across thousands of sites – without users being aware of it.
‘Sextortion’ attacks where cybercriminals blackmail victims with the threat of exposing explicit photographs or messages are increasingly common, according to a report by Bloomberg News.
Disgruntled employees and other malicious insiders could be one of the most serious security threats companies face – but the importance of the threat from the ‘enemy within’ varies according to who you ask.