In Pictures: 7 social engineering scams and how to avoid them
Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them.
A vulnerability in a widely used, open source genomic analysis software allowed attackers to edit records of patient genetic sequences, leaving them at risk of being prescribed ineffective or toxic drugs.
Former Department of Defence chief information security officer Lynwen Connick has called on the government to "get the basics right" around digital security in the wake of a cyber attack on the parliamentary computer network.
Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them.
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report.
Security company RSA's revelation that its network had been breached and information relating to its SecurID one-time password technology stolen has left customers and industry experts with more questions than answers.