Accident Scam Waiting to Happen
Beware of that accident scam call or text: losing money isn't the only risk.
Beware of that accident scam call or text: losing money isn't the only risk.
The adoption of smart technology to power city services could leave urban areas "wide open" to being hacked on a mass scale, says a cybersecurity expert.
What's the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.
A security expert has had a computer chip designed for tracking cows implanted into his hand by an 'unlicensed amateur' to hack phones from underneath the skin, reports Gizmodo.
Reporting from Interop 2015, Las Vegas, where it's all about the connectivity and the massive leaps forward in network capacity and speed, but security concerns are also in the mix.
Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.
Macro-malware attacks are on the rise, particularly in the United States and the United Kingdom, Microsoft has reported in a blog post.
OFAC will soon be enforcing economic and trade sanctions against individuals and groups outside the United States that use cyber attacks to threaten U.S. foreign policy, national security or economic stability.
What kind of punishment best fits a convicted hacker? Jail time for serious computer crimes is almost a certainty, but for one ex-hacker, Higinio Ochoa, the terms of his parole also include being "banned from the internet".
A vulnerability in the WordPress blogging platform has been uncovered which allows hackers to hijack websites with a comment containing malicious JavaScript, The Hill reveals.
Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.
Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern hemisphere's largest, most advanced optical telescope.
A major vendor of point-of-sale terminals has not changed the default passwords used on its devices in a quarter of a century, researchers have revealed at RSA 2015.
UK train services could be vulnerable to being hacked, hijacked and crashed, due to the trial of new digital signaling system designed to make lines safer.
Major themes of the 2015 RSA Conference: the degree to which the deployment of digital devices is outpacing our ability to deploy humans with the necessary skills and knowledge needed to secure data and systems.
What were the major themes from the RSA 2015 conference? Cameron Camp is on hand to give his verdict...
A 26-year-old hacker who helped expose the rape of a teenage girl could spend five times longer in jail than the perpetrators he outed.
The Samsung Galaxy S5 and other 'unnamed Android devices' are vulnerable to having the fingerprints they use for authentication cloned by hackers, reports Gizmodo.
If your files are encrypted by ransomware, should you pay the ransom? We examine the options...
A Kansas family are the latest victims of a hacked nanny cam, after noticing the device purchased to monitor their three-month-old baby was also monitoring them.