How hackers can use your fingerprints to frame you
Find out how hackers can use a camera, a computer program, and some wood glue to recreate your fingerprints.
Pot, meet kettle: Spyware maker compromised, denies everything
Hackers exposed monitoring software developer mSpy by accessing 400,000 records of user details and payment transactions.
Protecting your digital rights: Who is Access?
Digital freedoms are under attack worldwide. In countries like France and Turkey, governments are pushing for greater access to citizens' data without their consent,...
The Equation Group, hard drives and the Death Star of malware
Researchers at Kaspersky Lab have uncovered a new cyber-espionage toolset that possesses more than a passing resemblance to similar kits used by US intelligence...
Hacktivism and vandalism were the main motivations for DDoS attacks last year
Distributed denial of service (DDoS) attacks are growing in size, frequency and complexity, according to the latest Annual Infrastructure Report from Arbor Networks. The security...
Is ransomware the greatest highway robber of the 21st century?
The days of a Dick Turpin type of character pulling you over on the side of the road and demanding your valuables in return...
The KooZoo camera app: It’s a jungle out there
KooZoo is an app that allows you to turn your own smartphone into a secret recording device. This has caused some concerns over privacy.
“Bring your own device” to work: Is it worth it?
BYOD comes with numerous privacy risks.
Internet Systems Consortium site hacked
This week the Internet Systems Consortium (ISC.org) was hacked and visitors were redirected to a site distributing harmful malware.
Top 10 security breaches of 2014
That's right folks, it's time. Time for a roundup of the year's worst IT security breaches and how they've impacted the tech market at...