Popular microblogging platform Twitter is taking bold steps to try and put an end to the password as we know it, according to Sky News.
Archives - October 2014
There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.
Tips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.
Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops - from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.
An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
Cybercriminals taking advantage of a 'malvertising' attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.
Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.
Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as "audacious plans to tighten security".
Make sure you are running a half-decent browser, don't ignore browser security warnings, and enable two-factor authentication. That appears to be the lesson to learn from the latest attack on Chinese internet users.
Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country's upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.
Google has added an extra layer of security to its browser, by introducing USB authentication to Chrome, the company has announced in an official blog post.
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
A proof-of-concept worm that can hunt network attached storage (or NAS) devices has been created by a security researcher. According to Tech World, the worm can target devices created by three different manufacturers.
In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Stationary and office supply store Staples is the latest company to be dealing with a credit and debit card breach, according to Brian Krebs at Krebs on Security.
Facebook has a system in place to scan public 'paste' sites for email address and password combinations to stay one step ahead of possible leaks, according to The Register.
President Barack Obama has signed an executive order to increase security on federal credit cards, and has urged retailers and banks to do similar to combat identify fraud, reports Reuters.
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Over 4 million UPnP devices could be used to assist in distributed denial-of-service (DDoS) attacks, Akamai has warned.
Malware has come a long way since its earliest days, and aided by the rapid development of the internet it's certainly faster spreading than the weeks it took in the days of floppy disk transfer.