The UK National Crime Agency (NCA) has said that a cyber-criminal has taken control of computer webcams to spy on people having sex.
Researchers at enSilo spotted malware dubbed "Moker" that can alter security measures and take complete control of a victim's computer.
Twin brothers Muneeb and Sohaib Akhter were sentenced to prison by the Eastern District of Virginia for an array of offenses, including conspiracy to commit wire fraud, conspiracy to access a protected computer without authorization, conspiracy to access a government computer without authorization, and obstruction of justice.
Cybersecurity is a technical challenge. But it also usually has a legal and regulatory aspect as well.
Data Breach Blog
Yet another adware campaign stemming from China has been identified, and in this fresh go, victims' Android device can be completely taken over.
In the wake of the SYNful Knock attack on its routers, Cisco should re-engineer its devices to prevent future attacks, says Raimund Genes.
Can U.S. data protection laws protect privacy and preserve tech innovation and intellectual property?
The impact of Canada's anti-spam legislation for companies big and small.
Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.
Emerging Products: Cloud Security, Part 2
In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.
Me and my job
Click here for more information.