
Playing Pokémon GO can lead to unexpected dangers
Interest in Pokémon GO, the mobile augmented reality game that has users going places in the real world to capture, train, and battle with virtual Pokemon, has exploded the …

Secret Conversations: End-to-end encryption for Facebook Messenger
After integrating Open Whisper Systems’ Signal Protocol into WhatsApp earlier this year, Facebook has done the same to the Facebook Messenger app, and called the feature …

What happens to consumer trust when a business is breached?
In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …

Cyber espionage group uses low profile tools to hunt high profile targets
Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …

UK: Cybercrime now bigger threat than traditional crime
The accelerating pace of technology and criminal cyber capability currently outpaces the UK’s collective response to cybercrime, calling for stronger collaborative working …

Week in review: Mac malware boom, TP-LINK loses control of configuration domains
Here’s an overview of some of last week’s most interesting news, reviews and articles: TP-LINK loses control of two device configuration domains Security …

BMW ConnectedDrive flaws could be misused to tamper with car settings
Security researcher Benjamin Kunz Mejri has found two vulnerabilities in the BMW ConnectedDrive web portal/web application. About the vulnerabilities in BMW ConnectedDrive The …

Kovter malware masquerades as Firefox update
Click-ad-fraud Kovter malware, packaged as a legitimate Firefox browser update, is being delivered to unsuspecting victims via drive-by-download attacks. Kovter, which also …

DDoS extortion campaigns increasingly target businesses
80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months, according to Corero Network …

Keydnap malware opens backdoor, goes after passwords in OS X keychain
ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap. Keydnap has the ability to steal passwords and keys …

Growth prospects of the cloud-based information governance market
The global cloud-based information governance market will grow at a CAGR of more than 27% through 2020, according to Technavio. Cloud-based information governance involves the …

Avast to acquire AVG for $1.3 billion
Avast Software and AVG Technologies have entered into a purchase agreement in which Avast will offer to purchase all of the outstanding ordinary shares of AVG for $25.00 per …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation