As Internet crime knows no borders, mutual legal assistance involving various nations and, by extension, requests for extraditing suspected cyber-offenders are sometimes part and parcel of prosecution efforts.
The long arm of the law caught up with a number of cybercriminals in the first three months of this year.
An unusual ransomware request has been uncovered by researchers.
A closer look at Anti-Malware tests and the sometimes unreliable nature of the process.
In Part 1, our roundup of some of the most notable law enforcement actions against computer crime in the first quarter of 2018 will focus on arrests and charges involving suspected cyber-crooks.
Criminals have devised a new scheme that aims to drain the bank accounts of large corporations.
Hackers have managed to deface an array of popular YouTube music videos, changing titles and thumbnail images.
WeLiveSecurity sat down with Tony Anscombe, Global Security Evangelist and Industry Ambassador for ESET, to talk about RSA 2018, his talk at the conference, and what to expect.
The 2016 compromise of the league’s Twitter account is one of a number of high-profile social media hijackings.
Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.
Cybercriminals are believed to have stolen information for more than five million credit and debit cards that shoppers had used at dozens of Saks Fifth Avenue, Saks Off 5th and Lord & Taylor stores mainly in the United States between May 2017 and March 2018.
ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security.
The tech giant is taking the measure after a rise in malicious browser extensions that mine digital money by hijacking the processing power of users' computers. The clampdown follows Google’s recent move to stop serving any and all adverts promoting virtual currencies and initial coin offerings.
Implementing the five actions described in this article can help reduce your organization's cyber risk and bolster its security defenses
The Lazarus Group gained notoriety especially after cyber-sabotage against Sony Pictures Entertainment in 2014. Fast forward to late 2017 and the group continues to deploy its malicious tools, including disk-wiping malware known as KillDisk, to attack a number of targets.
The update plugs a security hole that exposes a million Drupal websites to attacks
The notorious ransomware prompted fears that aircraft production could be impacted
The game was uploaded to Google Play and attempted to trick users into unwittingly signing up for a weekly paid subscription
As World Backup Day reminds us, robust backups are integral to healthy information security practices of any organization. This is doubly true for those operating in critical sectors.
"Hacker-for-hire" service launched distributed denial-of-service (DDoS) attacks against websites and phone-bombed its victims.