The effectiveness of bug bounty programs
Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …
Google offers over $3M for breaking Chrome OS
With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …
Google searching for hardware alternatives to passwords
Passwords are on the way out, it seems. With current boom – and obvious success – of phishing, it’s time to see what could be a better alternative to this …
Fake game apps flood Google Play
Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …
Automated YouTube account generator offered to cyber crooks
You’re a spammer / malware peddler / phisher, and want to register hundreds of bogus accounts on a popular online service such as YouTube in order to lead users to your …
Spoofed Google Chrome update page serves malware
Malware peddlers are taking advantage of yesterday’s release of the latest version of Google Chrome and have already set up a spoofed page of the initial rollout page in …
Copied Android apps sold on Google Play at higher prices
App developer Root Uninstaller claims that some of his original apps for the Android platform have been copied and are currently being sold on Google Play. He offers the …
Google to change business practices to resolve FTC concerns
Google has agreed to change some of its business practices to resolve Federal Trade Commission concerns that those practices could stifle competition in the markets for …
Fraudulent digital certificate for Google web properties used in active attacks
A fraudulent digital certificate that could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties has …
Facebook and Google+ are prime targets for easy attacks
The law created to protect children’s online privacy actually increases risk, according to new research from Polytechnic Institute of New York University (NYU-Poly). The …
Fake versions of popular Apple apps sold on Google Play
If you are an Android user but you want to try out some of Apple’s most sought-after apps, you might be surprised to know that Apple has been seemingly offering them for …
Google Chrome App grabs identities, forges blogs in victims’ name to promote scam
A Google Chrome app that promises to change the color of Facebook accounts instead nabs authentication cookies and generates dozens of blogs registered to the victims’ …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?