Activision Blizzard - makers of game hits such as Call of Duty and World of Warcraft - have taken “aggressive” legal moves...
The never-ending Windows support scam often misrepresents obsolete MS-DOS utilities. But three simple rules will bypass most of that social engineering.
The popular online wallet site Dogevault is offline after attackers destroyed data on the site. The impact on user funds is unknown...
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to...
Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android...
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal...
Francois Gagnon is a Canadian business owner who was targeted because his company had lots of servers, and many customers - victims...
A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from...
An attack on the forums for the Boxee internet-TV service has yielded 158,000 customer passwords - and what appears to be email...
Anonymous threatens cyberattack on Albuquerque Police Department for shooting and killing mentally ill homeless man James M. Boyd. File photo of mentally ill...
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn...
A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer...
A group of Ukrainian hackers going with the handle of CyberBerkut has taken down the official website of North Atlantic Treaty Organization (NATO) along with...
Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially...
The emerging ‘internet of things’ raises big security questions, and vulnerabilities in connected devices such as ‘smart’ fridges may force companies to...
Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how...
The telecommunication system of Ukraine has got hit by cyber-attacks through the equipment which have been installed in the Russian-influenced Crimea. These...
The attackers were able to steal all the bitcoins stored in the bank’s “hot wallet” - the portion of its funds on...
More than 300,000 wireless routers worldwide are under the control of an unknown group of cybercriminals, who have made malicious changes to...
SAO PAULO — Brazilian hackers are threatening to disrupt the World Cup with attacks ranging from jamming websites to data theft, adding...
Businesses in America have increased security spending after the wave of high-profile cyber attacks late last year, including the Target breach -...