Oysters tablet comes preinstalled with Trojanized Android firmware
“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …
Hilton, Trump hotel chains hit by PoS malware
“Payment card data of visitors of a number of Hilton and Trump hotels in the US have been compromised, and some of it is being already used by crooks to rack up …
Mobile ad network exploited to launch JavaScript-based DDoS attack
A type of DDoS attack that has until now been mostly theoretical has become reality: CloudFlare engineers have spotted a browser-based Layer 7 flood hitting one of its …
Yahoo open-sources Gryffin, a large scale web security scanning platform
Yahoo has open-sourced Gryffin, a scanning platform for web applications.The developers’ goal was to create a security scanner that will be able to both discover as much …
Leaked Hacking Team emails show Saudi Arabia wanted to buy the company
Emails stolen in the Hacking Team breach and leaked online by the still unknown attackers continue to be analyzed, and offer insight into the inner workings and controversial …
How organizations can increase trust and resilience
Gartner said organizations must invest in three risk disciplines to increase trust and resilience. Running a digital business presents business leaders with an increasing …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
Infographic: Devaluing data, fighting cybercrime
For any organization connected to the Internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from …
Week in review: Apple tackles XcodeGhost malware, AVG will sell user data, iOS 9 exploit is worth $1 million
Here’s an overview of some of last week’s most interesting news and articles:Symantec fires employees who issued rogue Google certificatesOne of these testing …
Mapping the underground cybercrime economy in order to disrupt it
You’ve surely heard – everybody has – about the existence of an underground economy that allowed the proliferation of Internet crime. Many years ago cyber …
Mobile payments data breaches expected to grow
A survey of 900 cybersecurity experts shows an overwhelming majority (87%) expect an increase in mobile payment data breaches over the next 12 months, yet 42% have used this …
Free tool helps organizations respond to vulnerability reports
HackerOne released a new tool designed to help organizations improve the way they respond to reports about vulnerabilities in their software.The Vulnerability Coordination …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?