social engineering

Twitter investigates possibility that DMs were accessed during Bitcoin hack
data breaches

Twitter investigates possibility that DMs were accessed during Bitcoin hack

Twitter maintains the attack was the result of 'social engineering', although reports suggest an employee may have been bribed
17 Jul 2020
Businesses stung by convincing Office 365 voicemail scam
phishing

Businesses stung by convincing Office 365 voicemail scam

This latest wave of phishing attacks incorporates real audio recordings to create a sense of urgency
31 Oct 2019
NHS staff issued with fresh cyber security guidance
Security

NHS staff issued with fresh cyber security guidance

New campaign focuses on password security, phishing, social engineering, and on-site 'tailgating'
23 Sep 2019
FBI embarks on cyber criminal detainment spree
Arrest
Security

FBI embarks on cyber criminal detainment spree

Coordinated effort leads to hundreds of arrests and $3.7 million seized from phishing gangs around the world
11 Sep 2019
Hackers exploiting social engineering 'toolkits'
Security

Hackers exploiting social engineering 'toolkits'

Victims are being asked to download malware through visually compelling fake update prompts
4 Sep 2019
Fraudsters use AI voice manipulation to steal £200,000
social engineering

Fraudsters use AI voice manipulation to steal £200,000

Bold social engineering attack could be the first of many powered by machine learning
2 Sep 2019
What is ethical hacking? White hat hackers explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
How Mr. Robot ‘fudged’ its hacks to protect the public
Mr. Robot poster
Security

How Mr. Robot ‘fudged’ its hacks to protect the public

Showrunners debated over how accurate to make the show’s exploits
5 Jun 2019
Service takes itself offline after 800m records exposed
Image depicting email security
Security

Service takes itself offline after 800m records exposed

Researchers find a non-protected MongoDB instance amounting to 150GB of unique data
8 Mar 2019
Modlishka tool can allow attackers to bypass 2FA
two-factor authentication (2FA)

Modlishka tool can allow attackers to bypass 2FA

The reverse proxy 'Modlishka' tool is designed to make phishing attacks as "effective as possible"
9 Jan 2019
Face recognition tool could slurp Facebook data
Surveillance, machine learning, facial recognition
Security

Face recognition tool could slurp Facebook data

Security company claims software creates a level playing field for white hats and pen testers
10 Aug 2018
What is hacktivism?
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
9 Aug 2018
How Russia hacked the 2016 election
Security

How Russia hacked the 2016 election

A timeline of how 12 hackers allegedly corrupted the world's most powerful democracy
18 Jul 2018
Social engineering: your business' biggest security risk
social engineering

Social engineering: your business' biggest security risk

It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
De Montfort University launches a week of infosec events
cyber security

De Montfort University launches a week of infosec events

DMU students will be able to gain practical experience from industry experts
23 Feb 2018
Cryptocurrency miners: the latest tool for cyber criminals
digital currency

Cryptocurrency miners: the latest tool for cyber criminals

Learn more about the new form of cyber crime that is being driven by cryptocurrency fever
13 Feb 2018
Why Nadine Dorries is totally wrong about password sharing
Security

Why Nadine Dorries is totally wrong about password sharing

Frustration abounds as MPs expose their backwards security practises
4 Dec 2017
UK cops to lose access to Europol's cyber crime resources
Police lamp
cyber crime

UK cops to lose access to Europol's cyber crime resources

Cyber cops will be on their own once Britain leaves the EU
1 Dec 2017
Tim Berners-Lee: How we can win back the web
Business strategy

Tim Berners-Lee: How we can win back the web

The public must reject misinformation and keep control of their own data
13 Mar 2017
Malware-infected ads now greatest threat to mobile security
malware

Malware-infected ads now greatest threat to mobile security

Porn slips into second place as main vector for attack on smartphones.
5 Mar 2014
Anonymous hackers hit FBI collaborator
Hacker
public sector

Anonymous hackers hit FBI collaborator

Anonymous compromises various HBGary Federal websites and accesses around 50,000 emails.
7 Feb 2011
Security threats to beware in 2011
2011
Security

Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.
3 Jan 2011
Chinese Google hackers back?
China
Security

Chinese Google hackers back?

The same China-based hackers who were thought to have hit Google last year appear to be still active, Symantec has suggested.
14 Sep 2010