G20 2014 Summit Lure used to target Tibetan activists
APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being…
APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being…
For ordinary laptop and smartphone users, Wi-Fi is not ideal – but it’s sometimes near-inescapable.
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses…
Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is…
It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but…
Self-driving cars are just around the corner, with the UK government putting up £10 million (around $15.6 million) for cities…
Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center…
Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been…
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to…
The long-term health effects of electronic cigarettes – or E-cigarettes – are still open for discussion – but the devices…