CIA Director John Brennan says that connected appliances and networked vehicles will make the agency’s job harder - with more systems to protect, and more platforms which could be used to launch attacks.
Archives - February 2014
Phishing is unique among cyber attacks - it doesn’t rely on weaknesses in computer software, or new vulnerabilities - it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams - and why tablet and smartphone users need to stay alert.
Boeing has unveiled a smartphone fit for James Bond - the Boeing Black, which can connect to satellites and secret government telecoms networks, will self-destruct if tampered with, deleting all data and rendering the device useless.
A virus designed to infect Wi-Fi networks can spread through cities “as efficiently as the common cold spreads between humans”, researchers at the University of Liverpool have found.
Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.
Mark Brooks of OnlinePersonalsWatch works with many online dating sites - and says that all of them are plagued by fake profiles, scammers and criminals looking for money, not love. A few simple steps can help ensure you don't fall for a fake...
Mastercard is piloting a scheme where smartphone GPS systems are used to authenticate purchases for travellers - which could spell an end to the frustrating and common experience where cards are blocked instantly when used abroad.
Pirated versions of popular Mac apps, spread via torrent sites, try to infect your computer with malware... and steal Bitcoins.
Businesses in America have increased security spending after the wave of high-profile cyber attacks late last year, including the Target breach - and most U.S. companies expect such attacks to increase over the next two years.
Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to
If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard. Online criminals are attempting to infect innocent users’ computers, by disguising their attack as an e-ticket from the airline.
Trading has been suspended on the Bitcoin exchange Mt Gox and its website has closed, amid rumors that the exchange has lost 744,000 Bitcoins in an online theft - worth around $350 million at Monday’s trading prices, according to Wired
Researchers have demonstrated an attack that completely bypasses the protections offered by EMET - a Microsoft toolkit used to provide safeguards against zero-day attacks, according to Ars Technica.
The acquisition of chat service Whatsapp for $19 billion has been the technology story of the week - but serious privacy and security questions remain over Facebook's new messaging service.
Samsung has introduced fingerprint-scanning security as standard into its new flagship Galaxy S5 handset - with Finger Scanner offering secure shopping via Paypal direct from the handset in stores and websites, with a finger-swipe replacing passwords.
There are lots of ways that hackers can steal your passwords, and use them against you. So what can you do to fight back?
A large majority of routers used in small offices are plagued with security vulnerabilities - with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.
Hackers who stole hundreds of thousands of card details from upscale retailer Neiman Marcus set off more than 60,000 security alerts - but these were all missed by security staff at the company, according to a report by Bloomberg Businessweek.
Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.
In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.