It’s Safer Internet Day. But millions of devices which have not been designed with security in mind are connecting to…
Development
WhatsApp’s privacy settings are “broken” and can be bypassed by downloading a simple bit of software, claims the Dutch developer…
One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s…
With Valentine’s Day nearly upon us, millions will be looking for love online. Here’s six online dating scams to look…
Facebook has officially launched ThreatExchange – a collaborative social network where companies can share information on cybersecurity threats, in an…
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.…
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been…
Jamie Oliver’s website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.…
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known…
Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now…
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police. Source:…
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC…
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites…
In this post, we lift the veil on Casper – another piece of software that we believe to have been…
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile. Source:…
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke…
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.…
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Source: Read More
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. Source:…
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers…