The game was uploaded to Google Play and attempted to trick users into unwittingly signing up for a weekly paid subscription
As World Backup Day reminds us, robust backups are integral to healthy information security practices of any organization. This is doubly true for those operating in critical sectors.
"Hacker-for-hire" service launched distributed denial-of-service (DDoS) attacks against websites and phone-bombed its victims.
World Backup Day, celebrated annually on March 31, is a timely reminder of the importance of taking effective measures that can make all the difference when a data loss incident strikes. It is also a good time to pause and reflect on the rising tide of threats that organizations, notably those operating in critical industries, face in cyberspace.
Bitcoin gets all the press these days when it comes to cryptocurrency but the gap in market capitalization is narrowing.
Boobytrapped QR code can trick iOS 11 into taking you to a malicious website
Using the strategies and procedures we present in our paper could help prevent an attacker from taking control of your computer
The oil and gas industry is the target of as much as one-half of all cyberattacks in the Middle East
ATM jackpot gang is thought to have infiltrated over 100 financial firms in 40 countries costing banks more than one billion dollars.
WeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career.
Messages sent to your iPhone may not be as private as you think.
City officials confirm that Atlanta is dealing with a cyberattack that has locked down some internal systems and is holding them hostage using ransomware.
Latest ESET research strongly suggests that Glupteba is no longer tied to the infamous Operation Windigo.
The study found that the more time users spent on pirate sites the higher the likelihood that some type of malware would compromise their computers.
The lottery's operator has found that attackers probably used an automated method known as 'credential stuffing' to access up to 150 customer accounts.
Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.
The report also sheds light on how not to go about attracting new hires. Vague and inaccurate job descriptions along with job postings that include insufficient qualifications were found to top the list of turnoffs for many jobseekers
Diverse background can contribute to your organization's security. Here are some tips to get more diversity in security perspectives.
The latest episode of this series marks the halfway point in the third season and, in addition to some amazing camerawork there are several examples of actions related to IT security that crop up throughout the episode.
ESET researchers dicovered that Trojanized applications used to steal bitcoin were hosted inadvertently by the popular website download.cnet.com.