Two-thirds of top e-commerce sites still accept the weakest passwords, such as “123456” and “password” without warning users that these are the...
The emerging ‘internet of things’ raises big security questions, and vulnerabilities in connected devices such as ‘smart’ fridges may force companies to...
A group of Turkish hackers have hacked the official Twitter account of Mustafa Varank, who is a top political advisers of Prime...
Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don't...
A tech-firm has amazed the world with its proof-of-demonstration of a remote-controlled “stun copter” that can deliver 80,000 volts of electricity to...
Smartphones such as iPhone 5S rely on buttons to scan fingerprints - but the CEO of biometrics firm CrucialTec says that smartphones...
A futuristic app uses Google Glass to add an extra layer of privacy for users withdrawing cash from ATM machines - by...
Boeing is set to launch a self-destructing smartphone that would aid the spies, diplomats and others keep their data secure, according to...
A file of material purporting to include detailed information on trades at the Bitcoin exchange Mt Gox, has surfaced online, after attackers...
Recently it was announced that Satya Nadella will be Steve Ballmer’s successor as CEO of Microsoft. Of course for the cybercriminals this...
Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack - and on LinkedIn, talking...
Maybe it's time to think twice before rushing to click on a link, next time your favourite celebrity says something bizarre on...
Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how...
University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy,...
A document among the trove leaked by Edward Snowden contains slides showing images of flying saucer as reported by Yahoo News Following...
The telecommunication system of Ukraine has got hit by cyber-attacks through the equipment which have been installed in the Russian-influenced Crimea. These...
If someone rings you up to tell you that your bank card has been compromised, it may be because they want to...
Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” - a bogus version of Netflix which sends password...
Ex-NSA tech Snowden leaked documents had yet another element of surprise; it has a set of slides depicting mysterious spacecrafts referring to Flying...
Criminals seeking to kill endangered species and sell trophies online are turning to increasingly hi-tech methods to target their prey - including...
The attackers were able to steal all the bitcoins stored in the bank’s “hot wallet” - the portion of its funds on...