Online gamers have become a prime target for cybercriminals – with attacks this year targeting major game publishers such as Ubisoft and Nintendo, and developers such as Crytek.
Browsing: Malware and Vulnerabilities
It is not uncommon to see social media accounts, specifically Twitter accounts, directing users to malicious sites such as the ones hosting Android.Opfake, an issue we blogged about last year.
Call it insult to injury: Android users are used to being frequent malware targets, but they have other security issues to consider as well.
Google’s Android mobile operating system is so besieged by cyber hackers’ malicious apps that the malware count is on track to hit the million mark by 2014, a new report from cyber analysts Trend Micro warns.
The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars.
When Tor admitted early this week that some nodes on the network had suddenly and inexplicably gone dark, thanks in part to a malware attack, theories abounded as to just what was going on and why.
While UK and US unemployment figures are falling slightly, times are still difficult for many workers, and few are changing roles.
In its simplest form, online banking fraud is a relatively straightforward process. Like all fraud chains, it can be split to main two parts: obtaining compromised credentials and cashout.
I’ve written before about the huge benefits you can reap if you plan for large sitewide outages by giving yourself access to all the troubleshooting tools you’ll need ahead of time.
The security of the Web is looking a little like Al Bundy right about now (look it up kids).