Attackers used a Trojan program to target a security camera system in the Carmel Tunnels toll road in Haifa, shutting down the road for hours, and causing “hundreds of thousands of dollars” in damage.
Indonesia as a major source of malicious traffic? That's what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.
A huge amount of private information harvested via hotel Wi-Fi networks is on sale in China - including phone numbers, dates of birth and addresses from hotel guests who logged in to networks in their rooms.
Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll - and the target is often information, rather than cash.
The global press release distribution firm PR Newswire has admitted to a large-scale breach, in which usernames and passwords were stolen - but claims hackers have not sent out “fake” releases, which can be used to manipulate financial markets.
Cyberattacks seem to be a growth industry in Indonesia, with the region having pushed China off the top spot as the leading source of attack traffic in the last quarter, according to internet services provider Akamai.
Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit has admitted - and says he will discuss the issue with government if necessary.
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.
Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure - and action is needed to ensure nations stay safe, the EU’s cyber security agency ENISA said today.
The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the Ponemon Institute. Each cyberattack now costs companies nearly $1 million to resolve, on average - and the annualized cost to a sample of U.S. organizations was $11.56 million.
A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of banks, markets and payments systems against a simulated "major" attack by cybercriminals.
Internet Explorer users will be a great deal safer from Tuesday onwards, after Microsoft announced a patch for a vulnerability that has been exploited by attackers “for months” according to some reports.
Acrobat in hands of hackers, millions of customer details stolen, as Adobe admits to “unprecedented” breach
Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code for its Acrobat software, used to make and read PDF files. Adobe also admitted hackers had stolen data on 2.9 million customers.
Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned - and all it takes is one lucky strike to cause devastating damage to the power grid, or to companies which supply oil and gas.
Small businesses will be able to buy “cyber assurance” packages to protect against possible losses from cyber attacks - with a British insurance firm offering packages starting at £500 ($800).
An “identity theft service” which specialises in selling personal details gained access to some of the biggest consumer data firms, including Lexis Nexis and Kroll - and has had access to their computer systems “for months”. Stars such as Beyonce (pictured) had personal details leaked.
Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers - but some customers who have acquired these "second-hand" email addresses say they are receiving a “bonus” of personal information relating to the old owners.
Android gamers have been warned to be wary of Grand Theft Auto V’s official “partner” app – Grand Theft Auto iFruit – after a slew of fake, malicious apps appeared online in advance of the real version. The app, available now on iPhone, allows gamers to customise cars, and interact with a virtual pet –