Please turn on your JavaScript for this page to function normally.
Android unlocked
How secure are mobile banking apps?

Do banking institutions have a good handle on the things they need to remediate and new control layers they need to adopt to keep users secure? To answer those questions, …

spotlight
Executive spotlight: iovation’s new Vice President of Product

Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …

danger
Know your enemy: Defining the new taxonomy of malicious emails

Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …

architecture
Cybercrime can come in any shape or size, and not always the form you’d expect

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …

world
Modern threat landscape: Seismic shifts in motivation and focus

Cybercriminals revealed new levels of ambition in 2016 – a year marked by extraordinary attacks, including multi-million dollar virtual bank heists and overt attempts to …

eye
Hackers explain how they “owned” FlexiSpy

How did the hackers that go by the name Decepticons breach stalkerware manufacturer FlexiSpy? According to information purportedly provided by the attackers themselves, it …

Windows
Script for remote DoublePulsar backdoor removal available

NSA’s DoublePulsar backdoor can now be remotely uninstalled from any infected Windows machine, thanks to the updated detection script provided by security firm Countercept. …

vulnerability
NoTrove threat actor delivering millions of scam ads

Researchers at RiskIQ have identified NoTrove, a threat actor that is delivering millions of scam ads that threaten consumers and further undermine the digital advertising …

Eyes
Former Expedia IT support worker gets prison time for hacking execs’ emails, insider trading

A IT support technician formerly employed at Expedia offices in San Francisco was sentenced to 15 months in prison for securities fraud, plus three years supervised release. …

Wi-Fi
Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices

Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …

Security-as-a-Service
Security-as-a-Service: How mid-market companies achieve network security

Mid-tier companies are battling a black hole of time, security expertise, and budget to procure, implement, and manage a variety of security products, according to a study …

PC
Security improvements primary reason for Windows 10 migration

Migration to Windows 10 is expected to be faster than previous OS adoption, according to a survey by Gartner. The survey showed that 85 percent of enterprises will have …

Don't miss

Cybersecurity news