The hi-tech research wing of the US military DARPA (Defence Advanced Research Projects Agency) is to offer a $2 million prize offered for a fully automated defense system - a computer that defends itself without human intervention.
N/AExpert content, for researchers by researchers
No one is too surprised to meet robots on the International Space Station - its Robonaut has posed for dozens of photos with astronauts - but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.
As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be "out there" and their passwords need to be changed, we wanted to update yesterday's coverage of the story.
eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.
Blackshades is a RAT and the FBI has just arrested a lot of people involved in its use and distribution. But what's a RAT and how will these arrests impact cyber crime?
Google, Facebook, Twitter and AOL have joined forces to stamp out fake tech support services where customers are fooled into calling bogus technical support lines, where they are encouraged, not to fix their comptuer, but to install malware - or give away details crucial for identity theft.
A Gartner survey has found that one in four employees who bring their own smartphones and tablets to work suffered a security issue in the past year - and spent an hour per day on their BYOD devices.
There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.
Twitter has added more security measures to its site - making password resets easier, and making it trickier for cybercriminals to log in to accounts.
‘Spambots’ are a fact of life on Twitter - fake accounts built to spread everything from infected links to misinformation. Until now, users have had to rely on their instincts, but a tool - “Bot or Not” - helps to uncover fake accounts instantly.
A Miami high school student who hacked into his school’s website to change grades is facing “years” in custody, after Jose Bautista, 18, handed a written confession to police, according to ABC News’s report.
A reminder that malicious code can be spread via flash memory cards like SD cards, just as easily as it can spread on USB flash drives. Check these tips to get protected.
At 15 payment machines dotted around the Swedish city of Lund, people can buy items without needing a card - or a phone equipped with a “Near Field” chip. All that’s required are the correct veins.
Business continuity management is the key to securing your company's digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.
Samsung has upstaged rival Apple with a fingerprint-locked version of the password-vault app LastPass for its flagship Samsung Galaxy S5, available free on Google Play from today. One swipe unlocks ANY app or site on the phone.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.
Young people are seriously worrried about connected gadgets when it comes to privacy - worrying that 'connected' gadgets such as Smart TVs could give away more data than they are comfortable with, according to a new survey.
Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives". The attack appeared to have come via a third-party service connected to Twitter.
A new, terrifying weapon is in the hands of hackers - the ability to stop a toilet flush working. We look at 2014’s silliest hacking predictions of gadget doom.