If your files are encrypted by ransomware, should you pay the ransom? We examine the options...
Some of the tricks employed by the characters in the Mortal Kombat series aren't a million miles away from those deployed by...
It has been found that hackers can now easily abuse any website’s domain name based email addresses through the Google Apps for...
Nearly a quarter of digital advert impressions are faked, according to a new study. This advertising fraud is set to cost advertisers...
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week....
Many cybercriminals are not exactly Bond villain material - in fact, some are criminals with a level of weapons-grade stupidity that Bond...
The key to a good cyber defense strategy is to improve knowledge of current threats, and risks to businesses, according to law...
A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer...
Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how...
Computer users often feel bombarded by warnings about malware - particularly in internet browsers, which often repeatedly warn about risky sites -...
A large-scale “heist” targeting Bitcoin site BIPS led to the theft of $1 million in Bitcoin - the second such major attack...
A new app, Truly.am, aims to put a stop to a fast-growing area of online fraud - online dating scams - by...
From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here...
Cybercriminals are switching tactics, a leading security body has warned - and the combination of anonymisation technologies, mobile devices, and social media...
These days cybercriminals will use phone calls, SMS messages, emails, fake apps - and even couriers - in an effort to get...
Millions of dollars have been lost to an "ominous" new hi-tech tactic used by cybercriminals - where a low-powered DDoS attack is...
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed.
Cybercriminals are turning to a new digital currency, Perfect Money, in the wake of the closure of the notorious Liberty Reserve, which...
A $250 signal-boosting device for cellphone users can be hacked, two researchers claim - offering total access to phone calls, internet use...
Cybercriminals are using online car auctions and photo-sharing services to dupe victims into downloading malware, the FBI has warned. Once infected, the...