Post Thumbnail

A mobile payment system is only as secure as its weakest link... and in the case of Apple Pay, it's the banks' ability to verify who you are. The Guardian has learned that thieves are setting up iPhones with stolen IDs and taking advantage of lackadaisical identity checks (often just a part of the...

3 months ago 0 Comments
March 2, 2015 at 11:57AM
Post Thumbnail

Apparently, hackers wanting to control PCs are wasting their time with elaborate botnets and vulnerability exploits -- all they may really need is some pocket change. A study found that between 22 to 43 percent of people were willing to install unknown software on their PCs in return for payments ...

1 year ago 0 Comments
Post Thumbnail

Malware certainly exists for Linux, but it's more frequently targeted at servers than everyday PCs. Unfortunately, regular users now have more reason to worry: a rare instance of a Linux desktop trojan, Hand of Thief, has surfaced in the wild. The code swipes banking logins and other web sign-in d...

1 year ago 0 Comments