Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.
Europol have been working alongside a number of European law enforcement authorities in an attempt to crackdown against the use of Remote Access Trojans.
A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers’ sites offline, after receiving threats about an imminent internet attack.
You might already have mince pies on the mind as we countdown to Christmas, but cybercrime doesn’t sleep and neither should your security solutions. Here is this week’s security review – our recap of the biggest, most interesting stories and opinions from the past seven days.
A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.
The UK’s Science and Technology Committee has heard that it is possible for the government to remotely access and use smart toys to spy on suspects.
Tech support scams are “still big business”, ESET’s David Harley has previously said. In this guide we look at how fraudsters dupe their victims into handing over cash, while also corrupting their devices.
MEPs in the European Parliament have agreed on the need for EU-wide cybersecurity legislation, which will establish a common framework for all member states to subscribe to.
At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.
Have you spoke to your kids lately? We bet if you have, then you are all too familiar with what they tend to talk about – video games. While you may still be clueless about the ins and outs, its worth reading up on online gaming, as there are plenty of risks you never knew possible.
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For