ESET's Trends for 2016: (In)Security Everywhere report includes a review of the most important events of last year and outlines trends in...
It is being reported that the oil and gas sectors have suddenly become more vulnerable to cyber threats. In 2013, we at...
A repeat of last year’s gaming outage looks to have been avoided after hacker group Phantom Group claimed it won’t target Sony...
Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive...
New day, new phishing attack! This time, it’s the Apple id which has been used by the attackers to steal from the...
Short Bytes: As we are making progress on the front of online security, the cybercriminals are competing head-to-head to target every device connected...
Short Bytes: Belgian people have found a new weapon to deal with the terror threats in the form of cat pics. As...
After calling Anonymous ‘Idiots’ ISIS issues guidelines to its cronies to protect from hackers like Anonymous The Islamic State militant ISIL who...
A 15-year-old guy in Plymouth has been arrested by British police on the charges of launching DDoS attacks and for sending false bomb...
In an exclusive for We Live Security, Jean-Ian Boutin, a malware researcher at ESET, shares his thoughts on the past, present and...
Cybercrime is more aggressive and confrontational than it has ever been, Europol's latest Internet Organised Crime Threat Assessment (IOCTA) has stated.
Short Bytes: Lockheed Martin has decided to open source its secret cyber threat detection tool Laika BOSS at the Black Hat Conference...
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
Someone hacked the official Twitter account of UK based controversial Television personality, The Sun’s columnist Katie Hopkins and threatened to leak a sex...
The Supreme Court has reversed the decision to convict a Pennsylvania man who directed violent online threats at his ex-wife, citing intent...
A military white paper said on Tuesday that China needs to take strong measures in order to speed up the development of...
Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data...
Advanced persistent threats (APTs) are a growing concern to the world's companies and networks. This recorded webinar looks at real-world data breaches...
In a latest video footage from Anonymous, the notorious hacker group, a masked individual appears in a suit and delivers a well-structured...
Following Kaspersky Labs’ identification of a unit issuing attacks on distinct high-end hotel guests in Asia and the US, ANTLabs, a technology...
The House of Representatives Intelligence Committee has introduced a new threat sharing bill designed to let businesses share details of security treats...