Please turn on your JavaScript for this page to function normally.
Google adds another obstacle for developers of deceptive Chrome extensions

Starting on September 3, Google will begin disabling inline installation (i.e. installation from the developer’s website) for extensions linked to deceptive sites and …

UK job recruiters network hit by hacker, user info dumped online

TEAM (The Employment Agents Movement), the largest network of independent recruiters in the UK, has been hit by a Saudi Arabian hacker that goes by the online handle JM511.The …

Info of 2.4 million Carphone Warehouse customers stolen

Personal and financial information of 2.4 million customers of British mobile phone retailer Carphone Warehouse have likely been compromised in a breach, along with encrypted …

Week in review: New OS X threats, and how to protect your privacy on Windows 10

Here’s an overview of some of last week’s most interesting news and articles:What’s the state of your software?In the face of the repeated high profile breaches of …

File-stealing Firefox bug exploited in the wild, patch immediately!

A critical Firefox vulnerability has been spotted being exploited in the wild.The bug, reported by security researcher Cody Crews, allows attackers to violate Firefox’ …

EFF’s Privacy Badger prevents users being tracked online

The Electronic Frontier Foundation has finally released version 1.0 of Privacy Badger, a browser extension that blocks some of the sneakiest trackers that try to spy on your …

Pentagon’s unclassified email system breached, Russian hackers blamed

Pentagon’s Joint Staff unclassified email system, used by 4,000 military and civilian personnel, has been compromised by attackers, and it has been taken offline until …

The GasPot experiment: Hackers target gas tanks

Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set …

Vulnerabilities in 2015: 0-days, Android vs iOS, OpenSSL

Secunia has taken an early peek at the trend in vulnerabilities for 2015, and has presented the results at Black Hat USA 2015. Seven months into the year, the number of …

Getting BYOD right

According to a survey conducted by Kaspersky Lab in conjunction with B2B International, around half of the consumers surveyed also use their devices for work. However, only …

Easily exploitable Certifi-gate bug opens Android devices to hijacking

Check Point’s mobile security research team discovered a vulnerability in Android that affects phones, tablets and devices made by major manufacturers including LG, …

Photo gallery: Black Hat USA 2015, part 2

The Black Hat USA 2015 conference is underway at the Mandalay Bay Convention Center in Las Vegas. Take a peek at the happenings in the Business Hall.Featured vendors and …

Don't miss

Cybersecurity news