Google completes ban of extensions not in the Chrome Web Store
Google is slowly but surely working on preventing developers of malicious Chrome extensions from delivering their wares to users.First, in May 2014, they made it so that …
Sensitive customer data leaked following mSpy data breach
mSpy, a company that sells “customized and user-friendly mobile and computer monitoring solutions,” has apparently suffered a data breach.They still haven’t …
United Airlines offers air miles for vulnerability information
United Airlines has become the first airline to start a bug bounty program and instead of monetary rewards, it offers air miles: a million for remote code execution bugs, …
US House of Representatives votes to stop NSA’s bulk data collection
The highly debated USA FREEDOM Act, a bill whose purpose is “to rein in the dragnet collection of data by the NSA and other government agencies, increase transparency of …
New domains revive old spam
The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …
Organizations lack control over mobile workspaces
More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …
WinYahoo adware changes your Chrome secure preferences
“Potentially unwanted programs (PUPs) might not be as dangerous as malware, but can often lead to unexpected perils. Take for example WinYahoo. Despite it’s name …
APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal
“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …
11-year-old VM escape bug opens host machines to compromise
CrowdStrike researchers have recently discovered a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms, which could be …
BitTorrent releases free P2P private voice and text app
After an initial pre-alpha release in July 2014, BitTorrent’s peer-to-peer private voice and text app Bleep is finally available for curious Windows, Mac, iOS and …
![entrepreneur](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194853/entrepreneur-400x200.jpg)
Do ethics get in the way of security professionals?
While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …
Scammers are draining payment cards linked with Starbucks customer accounts
Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.In order to perform this …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days