How to protect children from in‑app purchase rip‑offs
Parents who simply hand an iPhone or iPad to a child and let them play a favorite game risk children buying expensive in-game items. But the new version of iOS has some great defenses built in.
Parents who simply hand an iPhone or iPad to a child and let them play a favorite game risk children buying expensive in-game items. But the new version of iOS has some great defenses built in.
An interesting new piece of Android malware has been spotted this week. The threat, detected by ESET security products as Android/Samsapo.A, uses a technique typical of computer worms to spread itself.
Many mainstream news outlets offered advice on dealing with the Heartbleed bug - some misleading. This week, a spoof video has finally cut to the heart of the matter, and offered the worst advice imaginable on how to deal with the bug.
Posts promising gruesome footage of a roller coaster accident at Universal Studios in Florida in which 16 people supposedly died are spreading fast on the social network - with victims fooled into spreading the scam to their friends.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.
New evidence has emerged that the new iPad will have fingerprint security built in, as found on the Apple iPhone 5S.
Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information - one, a way to contact them, and two, the fact they're in need of a job.
Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.
Young people are seriously worrried about connected gadgets when it comes to privacy - worrying that 'connected' gadgets such as Smart TVs could give away more data than they are comfortable with, according to a new survey.
Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives". The attack appeared to have come via a third-party service connected to Twitter.
Google is offering full refunds to buyers of the Virus Shield app which briefly topped the Android charts last week - but turned out to offer no protection whatsoever.
A flood of diet spam emails seemingly from AOL addresses has hit inboxes around the worl
The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a "global" shock, a report by a leading insurer has warned.
When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first - and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.
Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android smartphones.
A new, terrifying weapon is in the hands of hackers - the ability to stop a toilet flush working. We look at 2014’s silliest hacking predictions of gadget doom.
Google’s popular Chromebook laptops could soon do away with passwords entirely with a new system where simply bringing a phone near the laptop opens up the OS.
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal information - in this case, private information on Canadian taxpayers.