In Ubisoft's Watch Dogs, a man out for vengeance chooses an odd weapon - a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?
Search results for: "phishing"
Cybercriminals always look for the weakest link when planning their attacks – and failings in home routers can allow another "way in". A few simple adjustments will keep yours safe.
eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.
Many cybercriminals are not exactly Bond villain material - in fact, some are criminals with a level of weapons-grade stupidity that Bond villains wouldn't even employ as henchmen.
Tax identity fraud is on the rise this year, possibly due to criminals getting craftier in their choice of breach targets. According to a series of reports from Brian Krebs, fraudsters are now targeting third-party payroll services.
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here's why, and what you can do about it.
If computers continue to run Windows XP, and don't receive any more security patches. they are not just putting themselves and the data they carry at risk, they are endangering all of us who use the internet.
The Model S is rated one of the safest cars on the road - but the electronic security system protecting its locks may not be quite as bulletproof, researchers claim. The six-digit PIN used to protect its lock can be brute-forced, or phished, by attackers.
Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.
'Highly-paid' mystery shopper assignments where you're sent cashier's checks upfront can end up costing you a lot of money.
Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack - and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.
Maybe it's time to think twice before rushing to click on a link, next time your favourite celebrity says something bizarre on Twitter.
Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how effective a particular email is, according to an email security specialist.
If someone rings you up to tell you that your bank card has been compromised, it may be because they want to get their own hands on it.
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.
Yet another innovative tech support scam, using Netflix phishing to get remote access to the victim's system.
Phishing is unique among cyber attacks - it doesn’t rely on weaknesses in computer software, or new vulnerabilities - it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams - and why tablet and smartphone users need to stay alert.
The acquisition of chat service Whatsapp for $19 billion has been the technology story of the week - but serious privacy and security questions remain over Facebook's new messaging service.
There are lots of ways that hackers can steal your passwords, and use them against you. So what can you do to fight back?
The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print magazines could pose a risk to smartphone users, Australian researchers at Murdoch University have warned