Please turn on your JavaScript for this page to function normally.
Malware used in Target breach sold on underground forums

Target continues to be rather tight-lipped about the circumstances of the massive user data theft and the breach of their networks that made it possible, but the few details …

Microsoft extends support for Win XP’s security solutions to mid-2015

Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …

Starbucks iOS app stores passwords in clear text

A security researcher has discovered that Starbuck’s iOS mobile application stores users’ usernames, email address and passwords in clear text, and has tried to …

Scammers bypass protection mechanism, offer trojanized Minecraft Android app

Russian Android users who are looking to download the popular Minecraft game app from third-party app markets should be very careful, F-Secure researchers told PC Magazine, as …

User financial info compromised in US Fund for Unicef breach

The US Fund for Unicef, a non-profit NGO headquartered in New York, has notified the Office of the New Hampshire Attorney General that it had suffered a breach in November …

US Federal Court deals a blow to net neutrality

With a verdict of 3-to-0, judges of the US Court of Appeals for the District of Columbia Circuit have decided to strike down the Federal Communications Commission’s Open …

Target hackers shopping around for data decryption services?

The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …

Equation determines the optimal moment for a cyber attack

Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …

Trust but verify: Mozilla execs invite researchers to audit their code

The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …

Bitcoin cold storage and insurance services sprout

The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …

Fake Target breach notification leads to phishing and complex scams

The extensive Target breach has resounded far and wide in US media, and its customers should worry about their personal or credit card information being misused. After the …

Neiman Marcus, three other US retailers breached

In the wake of the revelations that US retail giant Target has been targeted by cyber thieves comes the news that American luxury department store Neiman Marcus has also …

Don't miss

Cybersecurity news