Please turn on your JavaScript for this page to function normally.
Major browser makers synchronize end of support for RC4

Mozilla, Google and Microsoft have come to an agreement: support for the increasingly vulnerable RC4 cryptographic cypher in the companies’ browsers will end in early …

Popular Android AppLock app full of gaping security holes

AppLock, by DoMobile, is a very popular Android app for limiting access to certain content on the device (text messages, photos, videos, etc.). The user decides what content …

0-days found in widely used Belkin router, fixes still unavailable

CERT/CC has issued a warning about the existence of several serious zero-day vulnerabilities affecting the popular Belkin N600 routers, and has offered advice on how users can …

Adware installer gives itself permission to access Mac users’ keychain

“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …

An emerging global threat: BEC scams hitting more and more businesses

As more and more victims come forward, and the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning …

Ashley Madison-themed blackmail, data deletion scams hitting inboxes

In the wake of the Ashley Madison hack and consequent data leaks, blackmailers and scammers are doing their best to extract as much money and information as it’s …

49 new Regin backdoor modules discovered

“Since Symantec and Kaspersky Lab researchers presented their findings on the Regin backdoor late last year, there has been only one additional publicly revealed …

How Linux Foundation sysadmins secure their workstations

Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations, as Konstantin Ryabitsev, Director of …

Over 225,000 Apple accounts compromised via iOS malware

“Researchers from Palo Alto Networks and China-based WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in …

Spotting malicious apps on Android markets just got easier

“Spotting malicious apps before they are offered for download and/or removing them is a tough challenge for every online Android app marketplace, including Google Play, …

cloud binary
Cloud Storage Security, A Practical Guide

Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …

UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service …

Don't miss

Cybersecurity news