When calling these people, you want to be able to get through.
Fairfax County, Virginia
'Denial of service' cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
We've all called up IT for help and been asked to turn our machines off and on again. Here's why.
Hex code from the Blaster worm reveals the potential motivations of the worm’s creator.
How can archivists properly preserve computer programs often written specifically to destroy data?
Try to make this the only time you see a ransomware warning notice.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
Criminals who hide their computers shouldn’t go free.
Computer criminal via shutterstock.com
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
Gah! What did I just do?!?!
Image of hands and computer via shutterstock.com
We are deepening our understanding of why people fall victim to the attacks in the first place.
Cybercriminals take advantage of computer users’ lack of education about their methods.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
Do not adjust your set.
Museum of Malware
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
A widespread and virulent ransomware, Angler, is de-fanged by having the world's most widely-used networking equipment ignore it
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.
Rombertik takes the nuclear option rather than be found.
National Nuclear Security Administration
Rombertik malware will happily take the nuclear option on your hard drive.
When malware stops looking like malware, we’re in for a tough ride.
patterns by cepera/shutterstock.com
Recognising malware patterns is key to the effectiveness of antivirus programs.
We need to take charge and teach ourselves a bit about the internet in order to stay safe online.
There is only so much government and business can do to keep us safe online. Ultimately we need to take personal responsibility for how we use the internet.
Who’s looking after your keys?
PC box shifter Lenovo's public whipping for serving up malware in its default installs should be a lesson to all.
Picking off hard drive manufacturers, one by one.
Mystery malware capable of hiding itself in a hard drives' internal electronics has been revealed, having spread worldwide for more than a decade.
Did they get any Jennifer Lawrence pics?
The recent cyber attack on Sony Pictures was so extensive there were notices placed on the entrance doors telling staff not to log in to the company’s network when they reached their desks. Sony’s entire…
Worry only if you have something to hide.
The computer-security firm Symantec says it may have found some of the most sophisticated malicious software ever made. The cyber-espionage bug, called Regin, has been making attacks for many years without…
Stolen credit card details, cheaper by the dozen when you buy online.
Imagine if UK banks decided to send out new credit cards to all their customers, but they were all “lost in the post” and the details ended up for sale on some dubious website. The recently discovered…
Swag bags and getaway cards are so 20th century.
The number of physical robberies on banks has fallen dramatically in recent years, but the amount of money banks are losing through electronic methods has rocketed. In 2013 for example, the annual fraud…