Major companies such as Disney, Boeing and General Electric are still handing out information to “hackers” using the most basic tool of...
Windows XP users already face far higher risks from malware - with XP users facing infection rates six times higher than Windows...
Previously, it had been estimated that around three million users had data accessed, but a new report by Brian Krebs of KrebsonSecurity...
President Obama’s Twitter and Facebook accounts were briefly compromised this week - with two Tweets and one post altered to send links...
A new app, Truly.am, aims to put a stop to a fast-growing area of online fraud - online dating scams - by...
An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer -...
Attackers used a Trojan program to target a security camera system in the Carmel Tunnels toll road in Haifa, shutting down the...
Diane Feinstein who is member of the senate committee of US and the lawmaker has said that she supports NSA and its...
When Google’s Safe Browsing service said that programming site PHP.net was hosting and serving malware, it sparked furious discussion - but the...
Indonesia as a major source of malicious traffic? That's what a recent infographic from content delivery network provider Akamai seemed to say....
A huge amount of private information harvested via hotel Wi-Fi networks is on sale in China - including phone numbers, dates of...
Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll - and the target is...
The global press release distribution firm PR Newswire has admitted to a large-scale breach, in which usernames and passwords were stolen -...
Cyberattacks seem to be a growth industry in Indonesia, with the region having pushed China off the top spot as the leading...
Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit...
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and...
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned...
The newly formed Intellectual Property Crime Unit of the City of London Police (IPCU) is in action. In its first operation the...
Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure - and action is needed to...
The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the...
A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of...