A demonstration of how TorrentLocker works, from infection to extortion. Made possible by joint research efforts with Deakin University (AU), this video aims to show how devices get infected, and how to avoid becoming a victim.
It’s never too late to rethink your habits when it comes to protecting your online security. Start securing your computing habits by making password management an essential aspect of your digital life.
This live casino online paper introduces the Automatic Identification Systems (AIS) used in the maritime industry, and provides a general overview of the technology as well as its identified vulnerabilities and threats.
While Sony recovers from the massive hack, we continue to monitor investigations and developments. Here's a rundown of what happened, what was stolen, who’s being implicated, and tips on how you can defend against likely attacks. [updated]
Dealing with attacks, intrusions, and data thefts is now a part of doing business for many organizations. The recent attack on Sony Pictures highlights the importance of proper incident response.
With Cyber Monday sales expected to rake in another record in most online sales in a day, threats are swooping in where people are most available and vulnerable. Secure your mobile shopping by following this flowchart.
Operation Huyao is a phishing attack that targets online shoppers without having to create a copy of the legitimate website. Before starting your online shopping spree, know how you can shop safely during the coming holidays.