Spear-phishing is creating a new era of cybercrime, according to Chris Dixon, a partner at venture capital firm Andreesen Horowitz - and in terms of its threat to enterprise, it’s comparable to a “super strain of bacteria.”
One day, your smartphone might “recognise” you by the way you walk, the way your fingers tap on a touchscreen - or even simply where you go during the day. Habits such as your walk can be as distinctive as a fingerprint, researchers claim.
Small businesses will be able to buy “cyber assurance” packages to protect against possible losses from cyber attacks - with a British insurance firm offering packages starting at £500 ($800).
An “identity theft service” which specialises in selling personal details gained access to some of the biggest consumer data firms, including Lexis Nexis and Kroll - and has had access to their computer systems “for months”. Stars such as Beyonce (pictured) had personal details leaked.
There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of malware came to our attention mid-August because of its interesting anti-debugging and code injection techniques.
Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers - but some customers who have acquired these "second-hand" email addresses say they are receiving a “bonus” of personal information relating to the old owners.
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work - a practise described as "Bring Your Own Disaster" by IT wags for years. Disasters, of course, DO happen - our tips should help you avoid being the guy who brings one.
Android users will now be able to remotely add a password to a lost device, even if it's locked, or already being used. Android police describe the new feature as "incredibly robust."
We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right now. We know that we don’t know. Today, ESET is releasing a simple tool to detect rootkits on OS X.
Germany's Chaos Computer Club released a video showing how a "fake fingerprint" made from latex could be used to fool the sensor, allowing any attacker access to the handset.
Android gamers have been warned to be wary of Grand Theft Auto V’s official “partner” app – Grand Theft Auto iFruit – after a slew of fake, malicious apps appeared online in advance of the real version. The app, available now on iPhone, allows gamers to customise cars, and interact with a virtual pet –
Cybercriminals are switching tactics, a leading security body has warned - and the combination of anonymisation technologies, mobile devices, and social media attacks could lead to cyberattacks with a “large impact”.
A stealthy banking Trojan known as Caphaw or Shylock has resurfaced - and is attacking customers of 24 American banks. It's armed with defensive abilities including the power to "restore" itself during shutdown.
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of
Malware, phishing and ID thieves are everywhere - but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.
A picture of a smooching couple actually delivers a kiss of death to Mac OS X users - it’s a new Mac Trojan which opens a backdoor on users’ machines. It’s the second piece of Mac malware detected in a week.
Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.
A hacked card reader - similar to the ones used in shops and restaurants - is on sale on Russian forums for $2,000, and can "text" details including PIN numbers to cybercriminals, who empty bank accounts in three hours using teams of money-launderers.
“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of detection - even by advanced inspection systems using optical microscopes.
Cybersecurity insurance or "cyber insurance" was a hot topic at the latest NIST workshop on the critical infrastructure cybersecurity framework (CSF) in Dallas. Will the CSF become a standard used by insurers to determine rates?