A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.
It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.
In Ubisoft’s Watch Dogs, a man out for vengeance chooses an odd weapon – a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?
Pirates who have downloaded one of the most popular torrent files of this week’s big game release Watch Dogs – ironically, themed around computer hacking – found malware pilfering their virtual gold (well, Bitcoins).
Activision Blizzard – makers of game hits such as Call of Duty and World of Warcraft – have taken “aggressive” legal moves against gamers who use illegal software to cheat in games – in particular, the hit strategy title Starcraft 2.
As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be “out there” and their passwords need to be changed, we wanted to update yesterday’s coverage of the story.
Many cybercriminals are not exactly Bond villain material – in fact, some are criminals with a level of weapons-grade stupidity that Bond villains wouldn’t even employ as henchmen.
The popular online wallet site Dogevault is offline after attackers destroyed data on the site. The impact on user funds is unknown – although site users have reported withdrawals from their accounts, some as large as 950,000 Dogecoin.
‘Smart’ televisions with built-in microphones could be used as bugging devices by corrupting the devices with malware, according to software specialists NCC Group, as reported by The Register.
A Miami high school student who hacked into his school’s website to change grades is facing “years” in custody, after Jose Bautista, 18, handed a written confession to police, according to ABC News’s report.
The key to a good cyber defense strategy is to improve knowledge of current threats, and risks to businesses, according to law enforcement professionals speaking at London’s Infosecurity Europe 2014 conference in London.
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.
Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.
The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.
When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.
A new, terrifying weapon is in the hands of hackers – the ability to stop a toilet flush working. We look at 2014’s silliest hacking predictions of gadget doom.
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal information – in this case, private information on Canadian taxpayers.