The World Economic Forum’s annual Global Risks report has highlighted risks inherent with Internet of Things style connected devices.
Bluetooth dongles provided to drivers by insurance companies to track driving habits are poorly secured, and could be hacked to hijack cars, reports The Register.
With Christmas fast becoming a distant memory and the January blues setting in, thousands of us are turning our eyes to booking a holiday abroad. But the recent hacks at United and American Airlines show that hackers see the travel industry as fertile territory.
A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.
Lizard Squad failed to encrypt its database of LizardStresser’s registered users – storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.
Cybersecurity and cybercrime are a hot political topic in America these days, but a history of ignoring warning signs suggests a lack of commitment to acting on the rhetoric.
Delegates were left red-faced after connecting to an open Wi-Fi network set up to protest mass digital surveillance.
Park ‘N Fly and OneStopParking are the latest companies to reveal data breaches, potentially exposing the card details of customers who used either service
President Barack Obama intends to persuade Congress to increase the sentence for hackers, as well as widen the definition of what hacking means, according to Ars Technica.
A ‘widespread’ malicious advertising campaign that sent web browsers to immitation websites has been stopped by Google
The end of mainstream support for Windows: Don’t repeat the mistakes of the past, and be prepared. Especially if you’ve only just got rid of all the Windows XP computers in your company.
Many of Corel’s photo, video and media editing programs contain DLL hijacking vulnerabilities, a security researcher has discovered.
Presenting a recorded webinar that seeks to answer this question: How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves?
A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.