Please turn on your JavaScript for this page to function normally.
fake apple order
Fake iPhone order dispatch confirmations hitting inboxes

Fake dispatch confirmation emails for a bogus order of an iPhone from Apple’s App Store are hitting inboxes, warns Hoax-Slayer. This is just the latest variant of the …

Apple
Apple finally announces bug bounty program

Apple is finally going to monetarily reward security researchers for spotting and responsibly disclosing bugs in the company’s products. The announcement that a bug …

MineMeld: The “Swiss army knife” of threat intelligence feeds

Palo Alto Networks has made publicly available MineMeld, an open source, community supported framework that can simply your consumption and sharing of threat intelligence. …

phishing
Security awareness training or no, users will keep clicking on dodgy links

There is no way to make humans never click on potentially dangerous links they receive, as the right combination of curiosity, context, and emotions will always beat security …

Car
Researchers continue hacking cars, and start on heavy vehicles

When Charlie Miller and Chris Valasek demonstrated a year ago how they can remotely exploit vulnerabilities in Chrysler’s 2014 Jeep Cherokee, and fiddle with its wipers, …

Impatient users saddled with malicious copycats of popular Prisma app

If an iOS app gains extreme popularity but still does not come in a version for Android, it can be practically guaranteed that malware peddlers and scammers will take …

Bitcoin
$77 million in Bitcoin stolen from Bitfinex exchange

Popular Hong Kong-based cryptocurrency exchange Bitfinex has suffered a security breach that resulted in the theft of millions’ worth of Bitcoin. 119,756 BTC, to be exact, …

Eyes
Hackers compromised Telegram accounts, identified 15 million users’ phone numbers

Hackers have managed to compromise over a dozen Telegram accounts belonging to Iranian political activists and identify phone numbers tied to 15 million Iranian Telegram …

To stop ransomware, opt for app graylisting and admin rights removal

CyberArk Labs tested over 23,000 ransomware samples from more than 30 prevalent malware families, including Cryptolocker, Petya and Locky, in order to better understand common …

tunnel
Kaspersky Lab launches public bug bounty program

Kaspersky Lab is asking researchers to look under the hood of two of its flagship security solutions and to report any bugs they might find. Kaspersky’s bug bounty …

Google notification Android
Android users to be warned of suspect Google account activity in real-time

Android users will soon enjoy an additional security layer that will allow them to quickly discover that their Google account might have been compromised. The feature will be …

business
How US, UK SMBs keep company passwords safe

AVG’s Business division has asked 381 of their small-to-medium business customers in the US and UK sixteen questions about their password-protection policies and …

Don't miss

Cybersecurity news