ESET researchers have discovered a piece of banking malware that employs a new technique to bypass dedicated browser protection measures
It's almost here but what are the legal ramifications of the incoming legislation for businesses
In 2017, the victims of BEC fraud were stung for $676 million, almost double the loss totals reported in the previous year
While the exact amount of stolen money and source of the cybercriminals are not known, the authorities have confirmed that no clients were affected.
We’re not in it for prizes (or cakes), but there’s no denying that we’re thrilled to be a finalist for the European Security Blogger Awards – and in five categories at that!
Use of software by law enforcement as a surveillance tool is a real concern for groups
The University of Greenwich has received a fine of £120,000 because of the substantial damage and substantial distress caused by a security breach that exposed the personal information of 20,000 people.
ESET researchers have observed a significant change in the campaign of the infamous espionage group
Get a better understanding of cybersecurity with this list of free online courses that you can take to become more cyber-aware
While training employees will not guarantee complete cyber safety for companies, it could go a long way to making workers more cyber-aware
One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago
What was Scan4You, and why was it called a counter anti-virus (CAV) website?
The Dark Overlord, known for a number of breaches and cyber-extortion campaigns in the last two years, is believed to have made US$275,000 from various schemes
With the deadline fast approaching, SMBs are reminded of what is required to become compliant
The move is intended to help address the mobile platform’s perennial problem – that many manufacturers of Android-powered devices are slow to get software updates out the door
Recent survey shows that adults in the US view computer hacking as a major threat to their quality of life
A team of academics says that, if exploited, the vulnerabilities can reveal the plaintext of encrypted emails, including those sent years ago
Double zero-day vulnerabilities fused into one. A mysterious sample enables attackers to execute arbitrary code with the highest privileges on intended targets
Do you still remember how WannaCryptor ran its – winding – course? It was a tale that revealed a number of intriguing plot lines amid the ransomworm’s numerous twists and turns.
The answer may hinge on if you're a glass-half-full or glass-half-empty kind of person. While we’re at it, how about regulators’ level of preparedness, anyway?