Breaches might be inevitable, but penalties are not harsh enough
A panel on the topic of data breaches organized by cyber security and penetration testing company Cognosec has revealed that most industry professionals believe that breaches …
Users force LinkedIn to bring back connections download tool used by scrapers
LinkedIn users have rejected a new data export process set up by the company, which would allow them to export their connections’ information with a delay of 24 or, …
Can organizations hold back the tide of cloud adoption?
For many organisations holding back the tide of cloud-based services adoption is almost impossible as the use cases are overwhelming, according to a new report by analyst firm …
Apple patches serious remotely exploitable iTunes and App Store flaw
Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple’s App Store and iTunes web apps, which can lead to …
Chrome extension thwarts user profiling based on typing behavior
The problems with passwords have already been well documented, and the main problem with static biometrics (“something you are”: fingerprints, retina patterns, …
One in 600 websites exposes sensitive info via easily accessible .git folder
Git is the most popular tool for software version control out there. Created by Linus Torvalds to facilitate Linux kernel development, Git is a boon for software developers as …
Dmail: A Chrome extension for sending self-destructing emails
Social bookmarking web service Delicious has released a free beta version of Dmail, an extension for the Chrome browser which allows senders to delete an email they sent and …
How complex attacks drive the IT security innovation race
There’s a need for organizations to reduce time to detection (TTD) in order to remediate against sophisticated attacks by highly motivated threat actors, according to …
New Google Drive phishing campaign exposed
Elastica discovered a new Google Drive-based advanced phishing campaign initiated by unknown attackers. The attackers used JavaScript code obfuscation and compromised websites …
Edward Snowden to discuss privacy at IP EXPO Europe 2015
Edward Snowden will deliver a keynote at IP EXPO Europe 2015, taking place at London’s ExCel. Joining the event live via satellite on Wednesday 7th October, Snowden will share …
Finally! A free, open source, on-premise virus scanner framework
After having spoken about it for quite a while, security researcher Robert Simmons has finally begun publishing the code and documentation of his open source AV scanner …
Over 5,000 mobile apps found performing in-app ad fraud
Of the $20 billion projected to be spent by advertisers on mobile advertising in 2015, $1 billion will effectively be lost due to in-app ad fraud, warns ad fraud detection and …