Cybersecurity: How to pass on your old devices without risk
Finding a new use for old kit is an excellent idea, but it's worth considering the security issues involved before you do anything else.
Finding a new use for old kit is an excellent idea, but it's worth considering the security issues involved before you do anything else.
Microsoft Office macros, PowerShell and more are still proving to be popular with cyber criminals distributing attacks via phishing emails, warn researchers after analysing billions of attacks.
FTC alleges Flo Health shared the health information of users with outside data analytics providers after promising that such information would be kept private.
Ransomware gangs are prioritizing stealing data from workstations used by executives in the hopes of finding and using valuable information to use in the extortion process.
Under the country's Criminal Procedure Code, the Singapore Police Force can obtain any data -- including information gathered by the contact tracing TraceTogether app and wearable token -- to facilitate criminal probes, confirms cabinet minister.
Europol and FBI among agencies that have taken control of the botnet infrastructure used by cyber criminals behind some of the most prolific malware and ransomware attacks.
Phishing, account compromise and business email compromise attacks are all worries for organisations - but it's fear of ransomware attacks that is causing the biggest concern.
Ransomware attacks are proving more lucrative for cyber criminals as even organisations that can restore from backups are paying ransom demands to prevent further damage.
The networking device vendor has published a series of mitigations as it's investigating the incident and preparing patches.
Cupertino is currently trusting developers to report honestly on what permissions and actions their apps are taking.