Please turn on your JavaScript for this page to function normally.
Cisco, Apple, Citrix products no longer welcome on Chinese government systems

A slew of US tech companies have been dropped from China’s Ministry of Finance’s approved government procurement list, including Apple, McAfee, Citrix Systems and …

Lenovo.com hijacking made possible by compromise of Webnic registrar

Lenovo simply can’t catch a break. After the massive negative attention it received for their ill-advised decision to ship some of its notebooks with pre-installed …

Google scraps Pwnium, invites researchers to submit Chrome bugs year-round

Google is scrapping its annual Pwnium hacking competition which has been held for four years in a row at the CanSecWest conference in Vancouver, Canada, but that doesn’t …

Over a million WP sites at risk of hijacking due to plugin bug

Users who run their websites on the popular WordPress CMS and are also using the WP-Slimstat web analytics plugin should update as soon as possible, warns Sucuri vulnerability …

Anthem breach affects millions of non-Anthem customers

Anthem, the second-largest health insurer in the United States, which has reported a massive data breach earlier this month, has finally come out with a more definite number …

How safe are Android-based children’s tablets?

Looking for an Android-based tablet for your child but don’t know which one to choose? If you are concerned about the security of your child’s data – as you …

Gemalto says NSA and GCHQ intrusions “probably happened”

“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …

Researchers create automated signature compiler for exploit detection

A trio of researchers from Microsoft and University of Erlangen-Nuremberg have created Kizzle, a compiler for generating signatures for detecting exploit kits delivering …

Critical Samba flaw allows unauthorized remote code execution

Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …

Google ups efforts to protect users against unwanted software

Google is looking to minimize its users’ exposure to potentially unwanted software, and to that end they have announced a few changes. For one, Chrome users will now see …

Fake face aging app steals Facebook login credentials

Offers for an app that can purportedly show you how you will look in 20 years have been recently popping up in Facebook users’ newsfeed and on their walls, occasionally …

Superfish not the only app using Komodia’s SSL-busting code

As Lenovo backtracked on its initial position that the Superfish adware pre-installed on some of its notebooks is not a security danger, and released a security advisory about …

Don't miss

Cybersecurity news