Cellphones can steal data from 'air-gapped computers'

Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...

ISPs need to do more to tackle major cyber-attack

Warnings about the impending cyber-attack have gone unheeded and more must be done to tackle the threat of an infection, according to the Institution of Engineering and Technology (IET).

First clinical study of computer security

Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the risk of infection by malicious software, or "malware". ...

Google maps malicious websites

Google expanded its Transparency Report on Tuesday to include maps of spots around the world where hackers are laying traps or baiting Internet users.

page 2 from 10