Please turn on your JavaScript for this page to function normally.
Scan of Google Play apps reveals thousands of secret keys

A team of researchers from Columbia University has downloaded and decompiled over 880,000 applications found on Google Play, and has discovered – among other things …

Would you run potentially malicious programs in return for a dollar?

A group of researchers have discovered a depressing fact: some computer users will download and run an executable that they can’t be sure isn’t malicious for as …

Microsoft patches DoS flaw in its Malware Protection Engine

Microsoft has released an update for its Malware Protection Engine to fix a privately reported security vulnerability that could allow a denial of service if the Microsoft …

Android smartphones pre-installed with malware hit the market

Cheap Android-based smartphones pre-installed with spyware are being distributed to European users, experts from German security vendor G Data are warning. The malware is …

GCHQ legally intercepts Google, Facebook users’ communications

A successful legal challenge has forced the UK’s top counter-terrorism official to reveal the (until now) secret government policy that allows the GCHQ to intercept …

Hacker nets over $600k by compromising NAS systems to mine Dogecoin

A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over …

There’s a new banking Trojan in town

A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …

Java program to reverse Android ransomware damage

University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …

A new defense against kernel-mode exploits

Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …

Being a CISO at a higher education institution

In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …

Use your own encryption keys for Amazon S3 storage

Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …

Microsoft says user content won’t be used for targeted advertising

Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools