Facebook has a system in place to scan public ‘paste’ sites for email address and password combinations to stay one step ahead of possible leaks, according to The Register.
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Over 4 million UPnP devices could be used to assist in distributed denial-of-service (DDoS) attacks, Akamai has warned.
The latest version of Android, nicknamed Lollipop, will offer a new feature that could make stolen phones a whole lot less valuable to thieves: the ability to only allow factory resets when entering a password.
Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.
Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.
The latest version of the Apple iPad is due to be announced at an event later today, and according to Gizmodo, the Californian tech company are planning on bringing the fingerprint security system implemented in recent iPhones to its tablet market for the first time.
A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population – and an insight into a grim underworld dominated by fraud, violence and sexual abuse.
On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?
Fans of Hungarian soccer team Ferencvaros have come “en masse to their home stadium in Budapest” to protest the club’s new biometric ID equipment, which controls turnstile entry to the stadium, according to Biometric Update.
In an announcement eerily reminiscent of the early phases of the Heartbleed flaw that took internet security by storm earlier in the year, Google has uncovered an exploit that could allow attackers to decode the plaintext traffic of a secure connection.
Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.
In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.
A hacking group has claimed that it has access to 6,937,081 Dropbox accounts with usernames and passwords, according to ZDNet. The first 400 log-in combinations were posted to Pastebin, with more to follow in return for payment in Bitcoin.
A breach of a third-party Snapchat site that allows users to bypass the app’s privacy has led to the leaking of some 200,000 images to the internet, The Guardian reports.