Please turn on your JavaScript for this page to function normally.
Facebook rolls out Graph Search for English speaking users

Graph Search, the semantic search engine whose Beta version Facebook introduced in March 2013, has been made available for everybody who uses the US English language. The …

Linux banking Trojan offered for sale

Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …

Chrome not the only browser that stores plain-text passwords

When choosing to import his Safari bookmarks and settings into Google’s Chrome browser, software developer Elliot Kember discovered that although it seemed like he could …

Black Code: Inside the Battle for Cyberspace

If anyone knows what's really going on in cyberspace and which forces threaten stability and security, it's Ronald Deibert and his colleagues from the well known and reputed …

Compromising Google Accounts and enterprises via flaw in Android SSO

When it comes to Android, Google has traded security for convenience, says Tripwire security researcher Craig Young. During his recent presentation at Def Con in Las Vegas, he …

Twitter turns to app-based two-factor authentication

When Twitter finally offered 2-factor authentication for its users in May, many were disappointed by the offering as its usefulness hinged on verification codes being …

Researchers create DIY IDS for identifying hacked smartphones

A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …

NSA tips off law enforcement, asks them to keep the practice secret

Just days after the NYT wrote about the NSA denying other federal intelligence agencies access to their surveillance tools comes the disclosure that a US Drug Enforcement …

German Minister calls for punishment of US companies involved in NSA spying

The revelations of mass online spying by US government agencies that involved cooperation from the British and the German governments and intelligence services, as well as the …

Advice on Tor use in wake of Freedom Hosting compromise

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …

Decoy water plant attracts hackers, Chinese APT1 crew

A Trend Micro researcher that has lately concentrated on finding out just how often industrial control systems are attacked and from where has shared the latest findings of …

Cross-platform backdoor created with RAT available online

For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …

Don't miss

Cybersecurity news