Please turn on your JavaScript for this page to function normally.
Anthem breach affects millions of non-Anthem customers

Anthem, the second-largest health insurer in the United States, which has reported a massive data breach earlier this month, has finally come out with a more definite number …

How safe are Android-based children’s tablets?

Looking for an Android-based tablet for your child but don’t know which one to choose? If you are concerned about the security of your child’s data – as you …

New DDoS attack and tools use Google Maps plugin as proxy

Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks. A known vulnerability in a Google Maps plugin for …

3 million strong RAMNIT botnet taken down

The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through …

Gemalto says NSA and GCHQ intrusions “probably happened”

“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …

Researchers create automated signature compiler for exploit detection

A trio of researchers from Microsoft and University of Erlangen-Nuremberg have created Kizzle, a compiler for generating signatures for detecting exploit kits delivering …

Known weaknesses plague the security threat landscape

Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …

Addressing cybersecurity business disruption attacks

Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …

Critical Samba flaw allows unauthorized remote code execution

Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …

Google ups efforts to protect users against unwanted software

Google is looking to minimize its users’ exposure to potentially unwanted software, and to that end they have announced a few changes. For one, Chrome users will now see …

Fake face aging app steals Facebook login credentials

Offers for an app that can purportedly show you how you will look in 20 years have been recently popping up in Facebook users’ newsfeed and on their walls, occasionally …

Internet of Things adoption is gaining momentum

Enterprise adoption of the Internet of Things (IoT) is starting to gain momentum, fueled by a mix of technological, political and social factors. The declining costs of …

Don't miss

Cybersecurity news