According to security firm Forcepoint, millennial's behaviour poses significant risk to federal IT systems
Figure shows that recorded incidents of Locky, one of the most common malware threats, dropped by over 80 percent during December -- but it'll be back.
The recent MongoDB ransomware hack in the cloud that made headlines earlier this week raises questions as to whether cloud platform providers should take the initiative in babysitting their most negligent customers.
A Victorian government hunting authority has accidentally sent customer data to people renewing their hunting licences.
Having encrypted data while in transit over a 10Gbps link between the US and Australia, Ericsson and Telstra are now looking towards testing the optical encryption technology over a 100Gbps link.
File-sharing remains offline as a precaution, but hospital says no patient data has been accessed in the attack.
Rather than using macros, this malware uses Visual Basic Script to avoid detection.
With the ability to offer low prices without compromising on technical specs, Chinese manufacturers of consumer video surveillance devices will outpace their US peers if market share boils down to a simple price war.
Unless your next smart fridge is going to have a support lifecycle the length of Windows XP, it's going to be cracked in a couple of years.
Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a misnamed app that turned out to be malicious. Every Android app has an ID value, commonly known as the package name, to uniquely identify it on a device and in Google Play. Show More Summary
Intel Security’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed the apps.) These malware are distributed as utilities and tools for analyzing access and automating the following of Instagram accounts. Show More Summary
BrickHouse Security is proud to be a part of the Indiana Association of Chiefs of Police Conference in Indianapolis on January 25th. The Mid-Winter conference will host nearly 100 booths, all geared towards law enforcement solutions....Show More Summary
European security agency says more needs to be done to make autonomous cars secure.
"Tried and tested" contingency plans are being used to ensure patient care is "not affected" says Barts Health group of hospitals.
Please, stop using "123456."
Researchers are now able to indentify 99 percent of users through a new browser fingerprinting technique.
Robots could be given 'electronic person' status, says report, which argues a legal framework is urgently needed for robots and self-driving cars.
If you use Google services, and you don't want anyone raiding or wrecking your account and services--not to mention your life--Google two-step verification security is for you.
Hundreds of unsecured Elasticsearch servers have been wiped in the past few hours in what could be a repeat of the recent mass ransom attacks on MongoDB databases.
Phishing emails contain names and telephone numbers of targets.