Please turn on your JavaScript for this page to function normally.
Hacker hijacks Apple devices remotely, asks for ransom

An unusual case of cyber extortion has been spotted in Australia: Apple device users in Queensland, NSW, Western Australia, South Australia and Victoria have woken up to see …

In wake of breach, eBay has to deal with multiple web vulnerabilities

As eBay flounders while trying to adequately respond to the breach it disclosed last week, and deems weak passwords to be good but stronger ones to be weak, researchers are …

DDoS attacks: Criminals get stealthier

There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these …

Reactions to the eBay breach

A database containing eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth was compromised. Here are some of the …

Cybercrime attack targets, victims, motivations and methods

Trustwave experts gathered the data from 691 breach investigations (a 54 percent increase from 2012) across 24 countries in addition to proprietary threat intelligence gleaned …

Law enforcement targets users of BlackShades malware

During two days of operations taking place in more than 10 countries worldwide, coordinated by Eurojust in The Hague and supported by the European Cybercrime Centre (EC3) at …

Carder sentenced to 20 years in prison

Member of Organization That Operated Online Marketplace for Stolen Personal Information Sentenced to 20 Years in Prison A Phoenix man convicted after a jury trial last …

US retailers set up center for cyber intelligence sharing

The US Retail Industry Leaders Association (RILA), along with several of America’s most recognized retail brands, launched the Retail Cyber Intelligence Sharing Center …

Average enterprise generates 10,000 security events daily

Damballa released its Q1 2014 State of Infections Report, compiled from analysis of 50% of North American ISP Internet traffic and 33% of mobile traffic, plus large volumes of …

Arrests in international voice-phishing case

Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …

The evolution of an Iranian hacker group

Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …

Office workers have little trust in digital world

The majority of UK office workers have trouble deciding who to trust in the digital world, however this isn’t surprising considering 14 percent have already been badly …

Don't miss

Cybersecurity news