The whole Heartbleed scandal has opened up a number of cans of security worms, one of which is an opportunity for phishers to wheel out exploits of their own.
Edward Snowden’s revelations have had far reaching implications – and are responsible for a leap forward in encryption for the average web surfer.
Do you think your email account isn’t that interesting to cyber-criminals? Well you’d be wrong, as it’s a treasure trove of vital data, as we’ll explain…
We look at why thieves find Bitcoin and other cryptocurrencies such juicy targets, and what you can do to protect your virtual hoard.
Russia has invaded the Crimea, and along with conventional force, digital attacks are also likely to play a big part in this conflict – particularly for Ukraine.
We’ve got some tips to help you avoid rogue programs which masquerade as legitimate software, creating all sorts of havoc once they’re installed.
A self-replicating worm is exploiting an authentication bypass vulnerability in Linksys home and small business routers. If you have one of the E-Series routers, you are at risk.
According to a kaspersky Lab researcher, a popular anti-theft software installed on laptops from pretty much every major computer manufacturer can be used by attackers to hijack computers.
This week, Target sent an email to customers informing them their personal information may have been stolen. Unfortunately, many of the people who received the email thought it was a scam. But why?
According to a new threat report, malware miscreants are using cloud hosting providers to hide their malicious activities.
Researchers have discovered a new variant of the CryptoLocker ransomware which could potentially infect even more users than the original version.
The Federal Election Commission was hit by a massive cyberattack hours after the government shutdown began, according to a report from the Center for Public Integrity.
"The last few years have established that no one is too big, too powerful, or too well-secured to suffer an attack or leakage," says David Harley, a senior research fellow at ESET.
New reports reveal that the NSA monitored six individuals' usage of adult websites with the intention of discrediting them in their communities. The men were believed to be foreign radicalizers.
Microsoft has fixed the Internet Explorer zero-day exploit in its November Patch Tuesday release. It also announced eight other bulletins for the release , addressing 19 unique vulnerabilities.
This is a no-frills VPN service that just gets the job done, and it’s free, albeit a bit more difficult to set up than some offerings.
It’s a mistake to think your business might be too small for cyber-thieves to target. Here are some tips to help keep your SMB secure.
The memory corruption vulnerabilities affected all supported versions of Internet Explorer web browsers running on all supported operating systems.
It's not hard to stay safe when you're using public Wi-Fi hotspots: You can simply use a virtual private network (VPN).
Security giant McAfee has introduced an encrypted cloud storage service secured by biometric locks as part of its new all-in-one LiveSafe security software suite.
Babylon Search is the toolbar that just won't die. But don't fret, simply follow our clear step-by-step instructions to get rid of it.
Adobe patched three new security flaws in its near-ubiquitous Flash Player, of which two were already being exploited in the wild by attackers targeting users of Mozilla's Firefox browser.
PDF files are often used in efforts to spread malicious code. We look at how to stay safe online when accessing PDFs.
Oracle will "get Java fixed up" and improve security, according to one of the database giant's security chiefs.
Current page: 1