
Firefox to prevent sites from tracking users by checking their battery status
Version 52 of the popular Firefox browser will no longer allow websites to access the Battery Status API and the information it can provide about the visitor’s device. …

Android spyware targets business executives
Overreliance on smartphones, both in out personal and professional lives, is a reality for many of us. These devices hold a lot of sensitive information – information …

Cisco plugs critical hole in Prime Home management platform
Cisco has released nine security alerts on Wednesday, and among these are two for critical vulnerabilities in its ASR 900 Series routers and the Cisco Prime Home management …

Overconfidence is putting organizations at higher risk for attacks
In the past twelve months, roughly one in three targeted attacks resulted in an actual security breach, which equates to two to three effective attacks per month for the …

Most activity on the dark web is legal and mundane
Terbium Labs has conducted a data-driven, fact-based research report that looked to identify what’s really taking place on the far corners of the Internet. Total …

When smartphone upgrades go wrong
As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest …

Merchants and financial institutions deal with escalating cyber attacks
Unsurprisingly, the Q3 2016 ThreatMetrix report shows a sharp increase in the number and complexity of cyber attacks. During what is traditionally a slow quarter, researchers …

Android Trojan targets customers of 94 banks in US, Europe
If you/ve recently installed a Flash Player Android app and now almost every app you open asks you for your payment card details, you’ve been infected with a banking …

Linux/IRCTelnet creates new, powerful IoT DDoS botnet
Linux/IRCTelnet (new Aidra), a new piece of Linux malware targeting IoT devices and turning them into DDoS-capable bots, has been spotted and analyzed by one of the …

Latest Windows zero-day exploited by DNC hackers
Due to Google’s public release of information about an actively exploited Windows zero-day, Microsoft was forced to offer its own view of things and more information …

NullCrew member sentenced to 45 months in prison
A Tennessee man has been sentenced to nearly four years in federal prison for launching cyber attacks on corporations, universities and governmental entities throughout the …

Integrating threat intelligence with existing security technologies
70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. Perceptions about the …