Members of a Russian cybercrime forum attempted to frame respected security blogger Brian Krebs by mailing 13 bags of heroin to his home and alerting police.
A hi-tech spoofing attack took “remote control” of a 213-foot yacht – steering it off course, without anyone touching the steering wheel.
NASA is no stranger to peering into nebulae in space – but the space agency found itself perplexed by the more Earthbound puzzle of cloud computing security, according to a report by the Office of the Inspector General.
A Twitter account used by international news agency Thomson Reuters was compromised this week, by hackers affiliated to the Syrian Electronic Army.
Recently, our anti-virus laboratory discovered an interesting new modification of a file virus known as Expiro which targets 64-bit files for infection. File-infecting viruses are well known and have been studied comprehensively over the years, but malicious code of this type almost invariably aimed to modify 32-bit files. One such family of file viruses, called
Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby, library, coffee shop or wherever you go to chill out with your digital devices.
Earlier estimates of “trillion-dollar” damage to the world economy may have overstated the financial impact of cybercrime, according to a report by the Center for Strategic and International Studies.
Many people leave phones and tablets “open” to criminals – both the cyber variety, and the ordinary, non-cyber kind. Our tips should help your handset safe.
Two researchers are to demonstrate a “hack” that allows control over automobile systems including brakes and steering in models by Ford and Toyota – overriding the commands sent by the driver.
A new study aims to identify the sort of people who are most likely to fall for phishing scams – and has found that women, introverts and the overconfident are more likely to confuse “real” email with phishing scams.
Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.
TOR-based botnets are not a new trend and were already being discussed a few years ago at Defcon 18 (“Resilient Botnet Command and Control with Tor”). But in the last year we’ve been able to confirm some interesting facts concerning the use of these ideas in real-world botnets. This topic was already discussed around the beginning
A fiber-optic tabletop PC system “reads” fingerprints as people use it – and could form the basis of a secure system for transactions in shops or banks.
The popular messaging app Tango has been hacked – and hacker group Syrian Electronic Army (SEA) claims to have accessed “millions” of users’ personal details, downloading 1.5 terabytes of information.
The PIN codes used to protect smartphones offer a useful line of defense against criminals – unless, that is, your device falls into the hands of the robot R2B2.
Passwords are outdated and “inevitably” fall into the hands of cybercriminals, according to a new advocacy group, Petition Against Passwords.
An Apple developer website was hacked last week, and has remained offline for days after an attack which Apple admits may have exposed, “names, mailing addresses, and email addresses.” A security researcher has claimed that the hack exposed up to 100,000 users’ details.
Spotting “bad” apps on Android is not always easy – with cybercriminals finding new tricks every month to fool phone and tablet users into downloading malware.
Millions of SIM cards in use today are vulnerable to hacking – allowing for attacks where SIM cards could be cloned remotely, or voicemail numbers could be changed, according to a German security researcher.
New “ransomware” attempts to terrify users into paying up by using the name of Britain’s SOCA crime unit – the Serious Organized Crime Agency, dealing with drugs, people smuggling, human trafficking, major gun crime, fraud and computer crime.