User education essential against social engineering attacks
The five-year analysis of data from Google’s Safe Browsing service shows that the threat landscape of today has evolved considerably from that of just five years ago, …
Google detects 9500 malicious sites per day
Five years after it was first introduced, Google’s Safe Browsing program continues to provide an invaluable service to the 600 million Chrome, Firefox, and Safari users, …
Anti-theft system for PCs and Android devices
Bitdefender launched an anti-theft system for PCs and Android devices that turns the tables on thieves, giving you control over your phone, laptop or tablet even when …
Democratic govts not immune to censorship attempts, says Google
Judging by the numbers contained in Google’s latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the …
PCI compliance scan for Google Drive
CloudLock announced a pattern matching engine that identifies, classifies, and secures sensitive information, including Personally Identifiable Information (PII), PCI data and …
Android spying app masquerades as Gmail
A new piece of Android malware that has recently been unearthed by NQ Mobile researchers is capable of logging text messages and phone calls, as well as record them, and send …
The rise of Tumblr and Google Play spam campaigns
In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …
Google warns Gmail users of state-sponsored attacks
Google will start warning users that might be targeted by state-sponsored attackers with clear alerts that pop up above their Gmail inboxes no matter what browser they use …
Researchers bypass Google’s Android Bouncer
First introduced to the public in February this year, Google’s Bouncer was welcomed as a great addition that aimed to make Google Play more secure for Android users. …
UGNazi attack 4chan, CloudFlare
Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …
iOS app creates different personas on social networks
Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
Featured news
Resources
Don't miss
- Balancing proprietary and open-source tools in cyber threat research
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management