Cisco has warned of a possibly imminent cyber-attack on the Ukraine, after a strain of what it believes is state-backed malware was found to be rapidly spreading in the country.
Many Mac users reported in the past few weeks that a process named “mshelper” had been eating up a lot of CPU power and draining their batteries. It turns out that the process is associated with a piece of malware designed to mine for Monero (XMR) cryptocurrency.
Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles.
A virtual private network, or VPN, can help you disguise your IP address when accessing the internet and can be a useful, legal tool.
Britain’s top prosecutor says that countries need to work together to determine the identity of attackers behind cross-border cyberattacks.
Although the standard adequacy approach is an effective means of ensuring free flow of data from the EU to third countries, it would not reflect the breadth and depth of the UK-EU relationship, according to the latest proposals published by the UK Brexit negotiating team.