Please turn on your JavaScript for this page to function normally.
Cyber attackers like to impersonate IT workers

Mandiant, the (apparent) go-to firm for the forensic investigation of high-profile breaches, has released its annual M-Trends report (registration required), which shows that …

Aggressive adware in Google Play apps

Bitdefender has discovered 10 Google Play apps that have been packed full of aggressive adware. These either subscribe users to premium-rate numbers using scareware messages …

Security framework for governments deploying the cloud

ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …

Freeware tool helps monitor privileged accounts

Netwrix Effective Permissions Reporting Tool is a freeware solution designed to monitor privileged accounts by reporting on effective permissions in Active Directory and file …

Real MITM attacks enabled by Komodia’s software might have already happened

When the issue of Lenovo’s pre-installed SSL-breaking Superfish adware first gained widespread media recognition, the company’s CTO Peter Hortensius tried to do …

Cisco, Apple, Citrix products no longer welcome on Chinese government systems

A slew of US tech companies have been dropped from China’s Ministry of Finance’s approved government procurement list, including Apple, McAfee, Citrix Systems and …

Lenovo.com hijacking made possible by compromise of Webnic registrar

Lenovo simply can’t catch a break. After the massive negative attention it received for their ill-advised decision to ship some of its notebooks with pre-installed …

The business and social impacts of cyber security issues

With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its resulting consequences at work as …

Companies expects others to protect them against DDoS attacks

One in five businesses surveyed believe that their online services should be protected against DDoS attacks by their IT service providers (in particular, network providers). …

Google scraps Pwnium, invites researchers to submit Chrome bugs year-round

Google is scrapping its annual Pwnium hacking competition which has been held for four years in a row at the CanSecWest conference in Vancouver, Canada, but that doesn’t …

Healthcare security spending to reach US$10 billion by 2020

The healthcare sector is ill-prepared for the new cyberage. Hospitals, clinics, trusts, and insurers are under attack from malicious online agents. The value of personal …

Over a million WP sites at risk of hijacking due to plugin bug

Users who run their websites on the popular WordPress CMS and are also using the WP-Slimstat web analytics plugin should update as soon as possible, warns Sucuri vulnerability …

Don't miss

Cybersecurity news