Almost everyone now has a Facebook account where posts and photos are frequently shared. However keeping track of what is posted can sometimes be a problem. Follow these 5 simple tips to get rid of content you no longer wish to share.
Ebay’s online ticket resale service Stubhub fell victim to a cyber-scam where a “global gang” used 1,600 hacked accounts on the service and bought and resold tickets, laundering $1m through European banks.
The developers of the Tor online privacy service are fixing a weakness which could have exposed the identities of hundreds of thousands of users of sites around the world.
Account hackers and thieves who loot magic weapons, armor and hard-won game currency from players in massively multiplayer titles such as World of Warcraft should face the same sentences as real-world thieves, a politician has suggested.
Tesla’s Model S has been hacked to make the doors and sun roof open while the car is in motion – and the researchers behind the attack were able to control the systems remotely.
Given the ‘nightmare’ that is password management, is Microsoft right to say that it’s sometimes OK to re-use the same memorable password on several sites?
Criminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically tries to break into PoS machines, called Win32/BrutPOS.A.
A new project aims to protect homes and small businesses from the security failings of Wi-Fi routers, a problem which has repeatedly hit the headlines over the past year.
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants of the malware and various distribution vectors that we’ve observed. Android/Simplocker has proven to be an actual threat in-the-wild in spite of its weaknesses…
Over the past few years, Comic-Con has had over 130,000 attendees, and those attendees tend to be very digitally literate – so that means we will probably see double that number of connected devices – laptops, tablets, smartphones and perhaps even tricorders.
A new kind of web tracking tool bypasses the protections privacy-conscious web users rely on and is already being used to track users across thousands of sites – without users being aware of it.
‘Sextortion’ attacks where cybercriminals blackmail victims with the threat of exposing explicit photographs or messages are increasingly common, according to a report by Bloomberg News.
Disgruntled employees and other malicious insiders could be one of the most serious security threats companies face – but the importance of the threat from the ‘enemy within’ varies according to who you ask.
Callous cybercriminals have used the Malaysia Airlines Flight MH17 tragedy as a lure for Facebook scams – creating fake profiles for victims of the crash.
A security researcher has built a remote control which hijacks any nearby Chromecast highlighting a Wi-Fi security issue, which allows an attacker to play a ‘surprise’ video on nearby gadgets.
Cyber criminals are constantly targeting home routers and its becoming increasingly difficult to keep them secure. Follow these 5 simple tips from We Live Security to lock criminals out.
New facial recognition technology which can instantly identify people from any digital image in seconds is being trialled in the UK for the first time.
Thinking of spending some time perusing Japanese porn websites before you do your online banking? Security researchers at ESET have analysed an organised malware campaign that stole the login credentials of online banking customers after infecting PCs that had visited X-rated websites.
Win32/Aibatook targets Japanese bank customers with an unusual Internet Explorer monitoring technique. We believe the malware has been in development for months – and is now ready for take-off.