Please turn on your JavaScript for this page to function normally.
How to enable two-step verification for iMessages and FaceTime

After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …

16 million mobile devices infected by malware

Security threats to mobile and residential devices and attacks on communications networks rose in 2014, threatening personal and corporate privacy and information. …

The limits of prevention-centric security programs

In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …

Phishing attacks increasingly target financial data

28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …

IT security training is a top priority for CIOs

CIOs are taking a multipronged approach to protecting sensitive company information, and the majority are currently taking or planning to take steps in the next 12 months to …

VirusTotal sets up huge AV whitelist to minimize false positives

One of the worst things that can happen to a software developer, and especially if they are a small firm or a single individual, is for their program to be falsely detected as …

Attackers can bypass Windows’ protections by changing a single bit

Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single …

Increase in enterprise cloud adoption and data risk

Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …

Improved Simplocker variant hits Android users hard

Mobile crypto-ransomware Simplocker has evolved, and returning the encrypted files to their unencrypted state is no longer easy as it was. First spotted in June 2014, …

A closer look at LepideAuditor Suite

Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes …

Active spam campaign leads to sophisticated PayPal phishing sites

PayPal-themed phishing campaigns are nothing new, but they are more and more legitimate-looking as time goes by. Researchers with OpenDNS Labs have spotted one such campaign …

Facebook unveils platform for exchanging security threat information

Facebook and sever other big Internet and tech companies have banded together to create ThreatExchange, a platform for exchanging security threat information. …

Don't miss

Cybersecurity news