Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to help answer this question.
Enhancing security in emerging smart critical infrastructures will be a key focus areas for the European Union Agency for Network and Information Security in 2016.
Exactly 46 years ago, on October 29th, 1969, the first bits of data were transmitted over a long distance between two computers … and the internet was born. International Internet Day present a great opportunity to remember how this global venture and its security have evolved.
The TalkTalk cyberattack has attracted a lot of media attention since it was first reported that a serious incident had taken place. We cut through the noise and offer a concise summary of what has transpired.
The world wide web has made shopping an altogether more pleasant, cost-effective and user-friendly experience. However, buying online has its risks. Here are five top tips to stay safe and secure.
The fallout from a Wall Street Journal technology expose that claims Theranos has been less than transparent over its blood tests continues with Walgreens putting its partnership with the company “up for discussion”.
A new report finds that in the world of business, it is in fact IT workers who are the riskiest users of technology.
Organisations of all sizes need to do more to protect their social media accounts from being hijacked.
TalkTalk’s chief executive has confirmed that she has received a ransom demand from an individual or group claiming responsibility for the cyberattack.
It has been revealed that TalkTalk has been subject to a “significant and sustained cyberattack”, with criminals likely to have accessed personal and banking details belonging to its customers.
Greater collaboration between the UK’s technology industry and police forces is essential to successfully tackle “high-volume, low-impact cybercrime”, a new report advises.
Apple has once again reiterated its claim that it is technically impossible for it to access encrypted data on iPhones that are running iOS 8 or higher and even if it was possible, it would be apprehensive to perform such an action.
Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?
Sony Pictures Entertainment says that it will pay out $8 million to its employees, over a data breach last year. The studio was attacked by cybercriminals over the release of the movie The Interview.
Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.
It has been claimed that the director of the CIA has had his personal email account breached by a teenager, with social engineering playing a part in the hack.
Vulnerabilities that have been found in LTE networks leave Android devices open to a DDoS attack, according to the Computer Emergency Response Team Coordination Center (CERT/CC) at Carnegie Mellon University.
Facebook has revealed that it will let its users know if their accounts have been subject to state-sponsored cyberattacks.
Many American homes have a false sense of security when it comes to their devices and networks – their digital doors could do with better protection.
A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer.