CyberCrime

Desert Falcon Cyber Espionage Group Has Attacked 3,000 Victims In 50 Countries

World's first Arabic cyber espionage team, dubbed Desert Falcons, has been targeting 'important people' with increasing determination

10 years ago

NSA Surveillance Program Hid Spyware In Hard Drives

Kaspersky Lab says global hard drives compromised by NSA-led 'The Equation Group', spyware dates back to 2001

10 years ago

Online Dating? Don’t Give It All Away Before The First Date, Security Experts Warn

1 in 10 online dating users immediately share personal details with people they ‘meet’ online, survey finds

10 years ago

How To Protect Yourself From Dating App Cyber Threats

Most dating apps are vulnerable to attacks from cyber criminals. Here's how to give hackers the cold shoulder

10 years ago

10 Hacker Horror Stories

To mark Friday the 13th, we've put together ten of the most horrifying hacker stories from history.

10 years ago

Facebook Unveils ThreatExchange Platform

New Facebook platform to allow professionals to share threat data to help bolster cyber security

10 years ago

How Dating Apps Could Destroy Your Business

IBM discovers majority of dating apps are vulnerable to cyberattacks - and they're installed on mobile devices used to access…

10 years ago

Confused ISIS Hackers Attack Non-League Football Club

Islamic State hackers fail to find back of the net with hack of a English non-league football club

10 years ago

Delta Airlines Sorry For Oral Sex Facebook Content

Facebook account of American airlines hacked and defaced with 'objectionable and offensive' content

10 years ago

Twitter Confirms CFO Account Hack

The Twitter account belonging to the CFO of the microblogging website falls victim to hack

10 years ago

Anonymous #OPIsis Attackers Take Down ISIS Twitter Accounts

Anonymous wants ISIS: “We will hunt you down and expose you."

10 years ago

Microsoft Patches Windows Bug Exploited By ‘Chinese Hackers’

Chinese espionage group allegedly used Windows and Flash flaws to target US military networks

10 years ago

Linux Foundation’s CII Continues To Fund Open-Source Security Efforts

The Core Infrastructure Initiative that was launched in the wake of Heartbleed to provide funding for critical open-source infrastructure projects…

10 years ago

How To Explain Malvertising To A Five-Year-Old

The definitive definition of malvertising from the experts for the kids (and adults, too)

10 years ago

Secretive UK Court Declares GCHQ Mass Surveillance Program Unlawful

GCHQ was operating illegally for at least seven years between 2007 and 2014

10 years ago

Anthem Hack Investigators Cite Chinese ‘Fingerprints’

Investigators of Anthem attack pursue evidence pointing to Chinese state-sponsored hackers

10 years ago

Anthem Hack: What Can We Learn From The Healthcare Industry’s Biggest Ever Breach?

Insurance firm, Anthem, allowed hackers to access 80m customers' records, but could it have been avoided? And how can you…

10 years ago

Death Threats From Hacker Lead To Prison Sentence

A hacker who made a number of death threats in Japan has been jailed in a case that captured the…

10 years ago

Anthem Admits Data Breach After ‘Sophisticated’ Attack

US healthcare insurer admits 80 million customer and staff records compromised in a damaging cyber attack

10 years ago

Wiper Worms: How To Avoid A Technology Wipeout

Malware development has reached a new threat level with the emergence of destructive ‘wiper’ worms, such as that used in…

10 years ago

Creator Of Online Black Market Silk Road Faces Life Behind Bars After Guilty Verdict

Ross Ulbricht AKA Dread Pirate Roberts was found guilty of seven federal charges, including drug trafficking and money laundering

10 years ago

Prison Sentence Looms For Revenge Porn Owner

The owner of a 'revenge porn' website has been convicted of numerous charges in the United States

10 years ago

Three Apps Pulled From Google Play After Infecting Millions Of Devices With Adware

More than 10 million devices have been infected by the malware, which tries to con users into needlessly spending money

10 years ago

Insecure Browsers Causing Spike In Malware Damage

The cost to respond to and remediate one security breach resulting from failed malware detection technology is approximately $62,000 per…

10 years ago

Third Time Unlucky: Adobe Forced To Release Hatrick Of Unscheduled Security Patches

Adobe's latest flaw has allowed hackers to take control of thousands of users' computers

10 years ago

Couples Beware – Could Your Sex Toys Be Spying On You?

Talk about a ruined Valentines Day - hacked sex toys can be accessed to post images and even video

10 years ago

Pirate Bay Website Reemerges After Shutdown

The Swedish Pirate Bay website returns after it was taken offline during a police raid

10 years ago

Governments Have No Idea How To Stop Cyberterrorists – Time To Call In John McClane, Says Eugene Kaspersky

Seen Die Hard 4.0? That’s what’s coming soon if you don’t shape up, Kaspersky warns world leaders

10 years ago

The Critic’s View: Data Privacy Day / Data Protection Day

Our round-up of the expert views concerning keeping your data safe online

10 years ago

DDoS Attack Volume On The Rise

Arbor's 10th Annual Worldwide Infrastructure Security Report points to the growing attack bandwidth and application layer attacks

10 years ago