Please turn on your JavaScript for this page to function normally.
Confidence in antivirus falls to all-time low

While concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is …

4,900 new Android malware strains discovered every day

“G DATA security experts discovered 440,267 new Android malware strains in the first quarter of 2015, which means that a new mobile malware strain for Android was …

Fake Twitter verification profiles trick victims into sharing personal, payment card info

A little over 18,000 Twitter users looking for a way to get their accounts verified have been duped by a single fake account promising to provide the service into visiting a …

US OPM takes vulnerable background investigation portal offline

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a …

Popular VPNs leak data, don’t offer promised privacy and anonymity

Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe …

Researcher proves how easy it is to pull off homographic phishing attacks

Security consultant Paul Moore has managed to register a domain that, at first glance, looks like that of UK-based Lloyds Bank, and get a valid TLS certificate for it from …

Worldwide IT spending to decline 5.5 percent in 2015

Worldwide IT spending is on pace to total $3.5 trillion in 2015, a 5.5 percent decline from 2014, according to the latest forecast by Gartner, Inc. Analysts attribute the …

NIST revises security publication on random number generation

In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for …

Security concerns continue to dog the cloud industry

Executives at major North American companies believe conventional network security solutions aren’t enough to protect their cloud computing environments, especially when it …

Major Xen update fixes over 20 vulns, including guest/host escape flaw

The newest version (v4.5.1) of popular hypervisor Xen has been released last week, and includes a bucketload of improvements and bug-fixes, including nearly 20 security …

Hackers are exploiting Magento flaw to steal payment card info

Attackers are exploiting a vulnerability in eBay’s Magento platform to steal users’ billing information (including payment card info), warns Sucuri …

4 in 10 midsize businesses have experienced a data breach

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to …

Don't miss

Cybersecurity news