Please turn on your JavaScript for this page to function normally.
Google adds another obstacle for developers of deceptive Chrome extensions

Starting on September 3, Google will begin disabling inline installation (i.e. installation from the developer’s website) for extensions linked to deceptive sites and …

UK job recruiters network hit by hacker, user info dumped online

TEAM (The Employment Agents Movement), the largest network of independent recruiters in the UK, has been hit by a Saudi Arabian hacker that goes by the online handle JM511.The …

Info of 2.4 million Carphone Warehouse customers stolen

Personal and financial information of 2.4 million customers of British mobile phone retailer Carphone Warehouse have likely been compromised in a breach, along with encrypted …

File-stealing Firefox bug exploited in the wild, patch immediately!

A critical Firefox vulnerability has been spotted being exploited in the wild.The bug, reported by security researcher Cody Crews, allows attackers to violate Firefox’ …

Pentagon’s unclassified email system breached, Russian hackers blamed

Pentagon’s Joint Staff unclassified email system, used by 4,000 military and civilian personnel, has been compromised by attackers, and it has been taken offline until …

GameOver Zeus gang boss also engaged in cyber espionage

Cyber crooks and cyber spies are often two distinct categories of attackers, but not always. Years-long research by the FBI, Fox-IT and Crowdstrike revealed that, at least in …

Zero-day disclosure-to-weaponization period cut in half

There’s no doubt about it: the batch of stolen information leaked in the wake of the Hacking Team breach was a boon for exploit kit developers.Not only did it contain a …

Android users rejoice! Security updates will be coming out faster

August 5, 2015, is the date that (hopefully) marks the beginning of one of the biggest positive changes in the Android ecosystem.Adrian Ludwig, Google’s lead engineer …

Microsoft expands Bug Bounty programs, increases rewards

Microsoft is continually tweaking its Bug Bounty programs, and the latest step in this evolution has been announced on Wednesday at Black Hat USA 2015.“We are raising …

Attackers use Google Drive, Dropbox to breach companies

A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …

WordPress 4.2.4 fixes critical vulnerabilities

It’s time to update your self-hosted versions of WordPress again.WordPress 4.2.4, released on Tuesday, fixes four bugs and several security issues: Three cross-site …

How to protect your privacy on Windows 10

So, you have decided to switch to Windows 10, but you heard that the new OS is a veritable vacuum for user data, which it sends back to Microsoft.Fear not! While most of the …

Don't miss

Cybersecurity news