Please turn on your JavaScript for this page to function normally.
Clever Android ransomware infects tens of thousands of devices

“A new, improved variant of the Android Simplocker ransomware is lurking on third-party app stores. “We estimate that tens of thousands of devices have been …

Cyber crooks opt for APT method for delivering malware

“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …

Major browser makers synchronize end of support for RC4

Mozilla, Google and Microsoft have come to an agreement: support for the increasingly vulnerable RC4 cryptographic cypher in the companies’ browsers will end in early …

Popular Android AppLock app full of gaping security holes

AppLock, by DoMobile, is a very popular Android app for limiting access to certain content on the device (text messages, photos, videos, etc.). The user decides what content …

0-days found in widely used Belkin router, fixes still unavailable

CERT/CC has issued a warning about the existence of several serious zero-day vulnerabilities affecting the popular Belkin N600 routers, and has offered advice on how users can …

95% of websites in 10 new TLDs are suspicious

Much has changed since the early days of the Internet when the Web had only six common top level domains (TLDs). Back then, what most consumers and businesses encountered were …

Snoopers’ Charter will cause extreme rise in business costs

The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, …

Verizon and Splunk deliver actionable threat intelligence

Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …

What’s burning up resources for IT pros during the summer?

IT pros felt the heat this summer as they kept networks humming along for remote workers on vacation. Over the summer months, most organizations see a significant expansion in …

Adware installer gives itself permission to access Mac users’ keychain

“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …

An emerging global threat: BEC scams hitting more and more businesses

As more and more victims come forward, and the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning …

Five years of hardware and software threat evolution

McAfee Labs commemorates the five-year anniversary of the Intel-McAfee union by comparing what researchers thought would happen beginning in 2010 with what actually happened …

Don't miss

Cybersecurity news