This genuine pay-as-you-go data suffers from limited coverage.
Ransomware with unbreakable encryption will attract cyber bandits like bees to honey. This is far worse than just malware.
While the energy industry may fear the appearance of another Stuxnet on the systems they use to keep oil and gas flowing and the electric grid powered, an equally devastating attack could come from a much more mundane source: phishing.
Hackers are exploiting the lack of security basics among social media, mobile devices and even in business, reports an IBM X-Force analysis
A malicious app is apparently being used to distribute mobile spyware on the popular via the free classifieds site.
The end of Microsoft's support for popular suite come April 2014 will usher in an era of 'infinite zero-day' attacks, analyst predicts
With IT not requiring safer pass codes and device usability a factor, finding of 80 percent of users choosing convenience not surprising
Hackers are increasingly turning to brute force attacks aimed at snaring credentials.
One in seven emails from financial brands poses risks to consumers, a study suggests.
Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released last week by Arbor Networks.
'Over-the-top' services are used to disguise text spam campaigns by sending a few messages from many phone numbers.
Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes in a report.
Texting scams continue to increase, with scammers using come-ons similar to the phishing techniques used in spam email for years.
Almost two-thirds of data breaches in 2012 could be attributed to negligence or human error and system glitches, reported the eighth annual Ponemon Global Cost of a Data Breach study.
Articles by John P. MelloNext Page