Children indulge in highly risky behavior online – with nearly one in five 9-11 year olds having physically met strangers they encountered online. Others use false identities – with some under-10s pretending to be 25.
Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll – and the target is often information, rather than cash.
Cybercriminals are already targeting mobile banking apps as a “way in” to customer accounts – as witnessed in ESET’s discovery of a new, advanced Trojan, Hesperbot. But a new IBM system may help secure smartphones – by using near-field communications chips (NFC) for an additional layer of security. It’s the first system to allow “two-factor”
The global press release distribution firm PR Newswire has admitted to a large-scale breach, in which usernames and passwords were stolen – but claims hackers have not sent out “fake” releases, which can be used to manipulate financial markets.
On average, Windows PC users spend five days a year waiting for their machines to load – and the culprit for slow machines isn’t always malware. Here are a few tips to restore your grumbling old PC to top speed.
Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.
Cyberattacks seem to be a growth industry in Indonesia, with the region having pushed China off the top spot as the leading source of attack traffic in the last quarter, according to internet services provider Akamai.
Apple has announced an event for October 22, with the usual teasing headline, “We still have a lot to cover.” Leaked pictures hint that at least one of those things will be an iPad protected by the Fingerprint ID system used in iPhone 5S.
Are legislation and regulation a viable means of making people and organizations do better at securing data systems and devices? I’m not talking about FIAT the car maker, but fiat: “an official order given by someone who has power.” How’s that working in light of NIST CSF and HIPAA?
Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit has admitted – and says he will discuss the issue with government if necessary.
From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here are some of the latest traps laid by cybercriminals – and how to sidestep them.
Most smartphones today contain an accelerometer – without them, the latest fitness apps don’t work – but a Stanford researchers has shown that the sensor can be used to “fingerprint” a device, handing valuable data to unscrupulous advertisers.
Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks – but there aren’t enough experts to go round.
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities – and discuss the evidence that Xunlei Networking Technologies is implicated.
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.
For many PC users USB keys must seem like a relic of a bygone age – but for security-conscious workers, keys can be a very safe place for data. Porsche and Lacie’s new USB offers password-protected storage for sensitive files.