This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.
Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.
You would be wrong to think that this is just an attempt by the criminals to steal your Apple ID password – bad as that would be. It’s much worse than that.
Two-factor authentication (2FA) is to be added to the PlayStation Network, offering members even greater security.
The Australian government has set aside $230 million in a new cybercrime strategy with a five-pronged plan of action.
In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.
Your phone number holds the key that could give cybercriminals access to your location, phone calls and texts, according to a news report.
Welcome to this week’s security review, which includes a detailed look at a new video scam sweeping Facebook and the return of a data-stealing malware dubbed Qbot.
How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.
Apple customers are prime targets for cyberattacks as they are more likely to have a high disposable income, a security expert has suggested.
My video, My first video, Private video: Don’t fall for this Facebook scam, which is infecting accounts around the world with a very high rate of success.
Security researchers have detected a new, updated strain of the data-stealing trojan Qbot that is “harder to detect and intercept”.
California hospital pays the largest sum per plaintiff in history for its inability to secure the patients’ medical data.
The personal information of 44,000 FDIC customers has been breached by a former employee, who left the agency carrying the data on a personal storage device.
Welcome to this week’s security review, which includes an in-depth look at how the ransomware dubbed Locky is infiltrating computer systems.