In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Stationary and office supply store Staples is the latest company to be dealing with a credit and debit card breach, according to Brian Krebs at Krebs on Security.
Facebook has a system in place to scan public ‘paste’ sites for email address and password combinations to stay one step ahead of possible leaks, according to The Register.
President Barack Obama has signed an executive order to increase security on federal credit cards, and has urged retailers and banks to do similar to combat identify fraud, reports Reuters.
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Malware has come a long way since its earliest days, and aided by the rapid development of the internet it’s certainly faster spreading than the weeks it took in the days of floppy disk transfer.
The latest version of Android, nicknamed Lollipop, will offer a new feature that could make stolen phones a whole lot less valuable to thieves: the ability to only allow factory resets when entering a password.
Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.
Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.