Cyber Crime

Cyber Crime

A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

Criminals are earning around $70 million a year by installing malware on users’ devices, a new study RiskIQ study reveals. The “Digital Bait” study,...

One of the most popular gifts this year is the Hello Barbie, an internet-connected doll that actively listens and responds to children, using fairly...

US officials are worried that hackers backed by foreign governments were able to spy on communications between the US government and private companies for...

Turkey has been accused by a variety of sources of aiding and abetting ISIS. Some of the accusations include giving medical treatment to ISIS...

Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...

The field of cyber warfare has brought about a paradigm shift in the old balance of power. Sheer force of numbers and financial and...

  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

  Chinese state-sponsored hacking of US computer networks has been a frequent feature in headlines in recent years. In this case, Chinese cyber attackers have...

Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...

We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...

Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

Paz Shabtai Following the Paris attacks, apparently planned under the noses of French and Belgian authorities, one possibility is that Islamic State militants have found...

Gad Elkin, EMEA Security Information Director, F5 DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...

Paz Shabtai While around 250 Jihadists have returned to France from Syria, England is reported to expect almost double that. As of now, MI5 and...

Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...

Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...

The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...

ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

TalkTalk, the British telecoms company, has admitted that it has suffered its third major cyberattack in the last 12 months with data from its...