Tips & advice


3185 articles

Malware, Cybercrime

All of Android's top 100 apps have been hacked - and banking apps are now a prime target, report finds

All of Android's top 100 apps have been hacked - and banking apps are now a prime target, report finds

Malware, Cybercrime

All of Android's top 100 apps have been hacked - and banking apps are now a prime target, report finds

All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as those used by banks - with 53% of Android banking apps having been cracked, according to a report by Arxan.

Rob Waugh12 Dec 2013


Scams, Cybercrime

Reverse charges: How one man turned the tables on PC phone scammers

Reverse charges: How one man turned the tables on PC phone scammers

Scams, Cybercrime

Reverse charges: How one man turned the tables on PC phone scammers

This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming there was a fault on his PC - but Pearson had both the time and the equipment to fight back.

Rob Waugh11 Dec 2013


How To, Scams

When it just doesn't click: How to date online without being scammed

When it just doesn't click: How to date online without being scammed

How To, Scams

When it just doesn't click: How to date online without being scammed

Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime - rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here's how to stay safe.

Rob Waugh10 Dec 2013


Malware, Cybercrime

FBI hacker teams have watched through PC webcams "for years", court hears

FBI hacker teams have watched through PC webcams "for years", court hears

Malware, Cybercrime

FBI hacker teams have watched through PC webcams "for years", court hears

The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC webcams, a court has heard. The teams operate "like normal hackers" - and rely on phishing and other criminal techniques.

Rob Waugh10 Dec 2013


How To

Can you hear us now? ESET researchers podcast every week

Can you hear us now? ESET researchers podcast every week

How To

Can you hear us now? ESET researchers podcast every week

Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.

Aryeh Goretsky09 Dec 2013


Malware, Cybercrime

Phantom menace? A guide to APTs - and why most of us have little to fear from these 'cyberweapons'

Phantom menace? A guide to APTs - and why most of us have little to fear from these 'cyberweapons'

Malware, Cybercrime

Phantom menace? A guide to APTs - and why most of us have little to fear from these 'cyberweapons'

APTs - or Advanced Persistent Threats - are the most menacing cyber attack there is, some say. Built to be stealthy, they penetrate networks, steal secrets - and vanish. 'Catching' one was a little like finding Bigfoot - but the much-hyped threat wasn't quite so scary up close...

Rob Waugh09 Dec 2013


Malware, Cybercrime

Will car-hacking be the “next global cybercrime”? Senator’s letter inspires debate

Will car-hacking be the “next global cybercrime”? Senator’s letter inspires debate

Malware, Cybercrime

Will car-hacking be the “next global cybercrime”? Senator’s letter inspires debate

As wireless technologies and electronic controls are increasingly built into cars, vehicles could become vulnerable to hackers - either stealing information, or injecting malware, a U.S. Senator warned - inspiring debate on how real this threat is.

Rob Waugh09 Dec 2013


How To

Why "crypto" isn't just for spies: A beginner's guide to keeping secrets

Why "crypto" isn't just for spies: A beginner's guide to keeping secrets

How To

Why "crypto" isn't just for spies: A beginner's guide to keeping secrets

For years, "encryption" has sounded like James Bond technology to many PC users - but new systems have made "crypto" technology easier to use, and a great way to protect the files you REALLY value.

Rob Waugh06 Dec 2013


Malware, Cybercrime

Microsoft’s new crime-fighting super-team strikes blow against million-strong "zombie army"

Microsoft’s new crime-fighting super-team strikes blow against million-strong "zombie army"

Malware, Cybercrime

Microsoft’s new crime-fighting super-team strikes blow against million-strong "zombie army"

Only weeks after Microsoft unveiled a global Cybercrime Center armed with new, hi-tech tools to combat crime, it announced it had carried out a global action leading to "significant disruption" of the Siferef botnet, a network controlling up to two million "zombie" PCs.

Rob Waugh06 Dec 2013