Many cybercriminals are not exactly Bond villain material - in fact, some are criminals with a level of weapons-grade stupidity that Bond villains wouldn't even employ as henchmen.
Search results for: "facebook"
Technology giants with large ad networks need to do more to protect consumers from hackers infiltrating their advertising networks to deliver malicious adverts - or even point users to sites that serve malware, the U.S. Senate has warned.
Phil Zimmermann invented the most widely used system of email encryption in the world - and says that Fortune 100 companies are queuing up for his encrypted Blackphone, which allows "whispered" conversations, anywhere.
If only two factor authentication had been used, maybe the database would never have been accessed by online criminals.
If you have an account on link-shortening service Bitly, you should take steps now to protect your account.
An interesting new piece of Android malware has been spotted this week. The threat, detected by ESET security products as Android/Samsapo.A, uses a technique typical of computer worms to spread itself.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here's why, and what you can do about it.
When parents post photographs and information about their children to social media, what are the privacy implications for those children when they're grown? What happens on the internet tends to stay on the internet, and not necessarily in a good way.
The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on public confidence in technology companies in America, such as Internet service providers and software companies, according to a Harris poll commissioned by ESET. The poll found that two-thirds of adult Americans who said
Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge" - and one-fifth had found "incriminating" posts which they confronted children about.
DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes how the malware guesses router passwords as part of its campaign to misdirect users, send spam and infect new victims.
Popular blogging service Tumblr has become the latest web giant to add two-factor authentication as an “extra layer” of security for users - describing its new measure as a "nuclear defense system" armed with twin keys.
Mark Zuckerberg, Paypal founder Elon Musk and Ashton Kutcher have invested $40 million in an artificial-intelligence start-up, Vicarious, which can already 'read' CAPTCHA codes - and aims to mimic functions of the human brain.
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS - allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.
A post promising a video of a plane landing on water has been circulating on Facebook, with a title suggesting that it contains news footage of the rescue of passengers on board the missing flight MH370 - but there is no video, and it's a criminal scam.
Hit messaging app Whatsapp may not be as secure as its 450 million users believe - after an independent security consultant revealed a loophole which rogue app developers could use to steal Android users’ entire Whatsapp history.
Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack - and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.