Gamers and cellphone users were targeted by criminal groups around the world this week – while retailers continued to suffer at the hands of POS malware, and a phishing campaign highlighted just how hot Bitcoin is right now.
You are never truly invisible online – and even if you equip yourself with an arsenal of privacy tools, you’ll still be watched. But there are ways to ensure that you and your business never “overshare”. Here’s seven of them.
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android security – but seem to be built to spy on passing cellphone users, according to Popular Science.
The FBI has issued a warning to police and other emergency response personnel about a lethal new tool which ‘malicious actors’ have been using to deadly effect against American government institutions – Google dorks.
A data breach of staggering proportions has hit South Korea – involving 27 million people and 220 million private records – all bought from hackers with the goal of stealing money from online games.
Concern is growing over the export of surveillance equipment which can track the movements of anyone carrying a cellphone. Such technnologies are freely on sale not only to oppressive regimes, but also to criminal gangs.
More than a thousand U.S. businesses have been affected by point-of-sale malware – malicious software written specifically for online fraud, to steal information such as credit card details from businesses and their customers.
An image of a Russian car crash has piled up in Google Images – leading to speculation that the service has been hacked. What’s less clear is why, or who might have done it.
Sony’s PlayStation Network was back online and the information of its 53 million users safe, despite a weekend-long cyber attack, and a reported bomb threat which caused the diversion of a flight carrying a Sony executive.
A new tactic where waves of Bitcoin wallet phishing emails are targeted at corporations has proved a success for the criminals behind it – with nearly 2.7% of victims clicking on the malicious link embedded in the two waves of 12,000 emails.
Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for both digital and physical theft. You can make going back to school an easier transition by ensuring your data and devices are secure both at school and at home.
This week saw two of the scariest targets for hacks ever – nuclear plants and city-wide traffic systems. Tthe traffic-light hack could basically have paralyzedany one of 40 American cities, and America’s Nuclear Regulatory Commission was successfully attacked three times within the past three years.
But some things on Facebook haven’t changed – namely, the scams. It’s not that cybercriminals are unoriginal – it’s just that there are a few Facebook scams which work again and again. Here’s why.
Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the originator…
The most famous traffic light ‘hack’ in history is in the classic film, The Italian Job (1969), where the heist involves paralyzing Turin via its traffic control system – but the reality is much easier.