Please turn on your JavaScript for this page to function normally.
Android Marshmallow
Asacub Android Trojan: Financial fraud and information stealing

Asacub is a new malware that targets Android users for financial gain. When first identified, Asacub displayed all the signs of an information stealing malware; however, some …

shadow
Exposing the shadow data threat

Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …

escalator
How well protected is NHS data?

A new study carried out by Vanson Bourne reveals a gap between the perceived strength of IT security measures in the NHS and the actual level of IT security built into NHS …

Tux
0-day in Linux kernel endangers Linux servers, Android devices

A serious and pretty longstanding flaw in the Linux kernel has been recently discovered by researchers from infosec outfit Perception Point. The vulnerability (CVE-2016-0728) …

Apple
Apple kills 28 flaws in OS X, iOS and QuickTime

If you use Apple’s OS X El Capitan, iOS and QuickTime on any of your computers and devices, you might want to implement the latest updates pushed out on Tuesday. OS X El …

Intel CPU
Intel patches MiTM flaw in its Driver Update Utility

Intel has fixed a remotely exploitable vulnerability (CVE-2016-1493) in the Intel Driver Update Utility which could be used by a man-in-the-middle attacker to corrupt …

linux tux
New Linux Trojan performs system reconnaissance

A new Linux threat has been identified by Dr. Web researchers. Dubbed Linux.Ekoms.1, this Trojan’s apparent function is to discover details about the system it has …

flames
Industrialized attackers systematically destroy defender confidence

Only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns, according to …

robot
Rise of automation: Battle of the bots

As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …

lock
Businesses fail to take full advantage of encryption technology

Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of …

Steam
Malicious Chrome extensions ransack Steam users’ inventory

Steam users are being targeted by a scammer that’s offering apparently helpful Chrome extensions for free, but is actually using them to steal items from victims’ …

Netflix
Netflix confirms it will start blocking proxies and unblockers

Netflix recently expanded its streaming services to nearly every country in the world. This good news for potential users in those countries has dampened the spirits of those …

Don't miss

Cybersecurity news