How developers fight the rise in web application attacks
Recent reports highlight the challenge faced by developers in securing code as attacks against web applications increase, while security budgets for developers remain low, …
Phone metadata can reveal sensitive info about individuals
Since Snowden revealed that the NSA collects from Verizon phone records of US citizens on a daily basis, those who support that kind of collection have been repeatedly …
FindFace app heralds the end of public anonymity and privacy?
While Facebook battles in court to be allowed to use its facial recognition tech (which it already gave up using in Europe), another company – whose facial recognition …
Bitly partners with Let’s Encrypt for HTTPS links
Bitly processes data associated with more than 12 billion clicks per month, leading to massive troves of intelligence. Now, they’re partnering with Let’s Encrypt …
Google drops support for old crypto on Gmail, SMTP servers
In less than a month, Google will stop supporting SSLv3 and RC4 on its SMTP and Gmail’s web servers. The end of support is not unexpected, as the Internet giant announced the …
Tech support scammers start locking Windows computers
Tech support scammers have come up with a new way to trick users into sharing their payment card information: screen lockers showing fake Windows alerts telling users that …
Criminals turn entire ATMs into skimmers
As if withdrawing money from an ATM wasn’t dangerous enough, researchers discovered that Russian-speaking Skimer group forces ATMs to assist them in stealing users’ …
Cybercrime economy: The business of hacking
The profile of typical cyber attackers – and the interconnected nature of their underground economy – have evolved in the last several years. Adversaries are …
Almost all Android users vulnerable to Accessibility Clickjacking attacks
Symantec researchers recently posited that Android banking malware with screen overlay capabilities might soon start tricking users into turning on Android’s Accessibility …
Only two percent of IT experts consider third-party secure access a top priority
Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …
Black Jack Free app carries deadly banking Trojan
Despite Google’s best efforts, malware peddlers occasionally manage to get their malicious wares on Google Play. The latest example of this unfortunate reality is an app …
Bug in Symantec’s anti-virus engine can lead to system compromise
Google Project Zero researcher Tavis Ormandy has unearthed a critical remote code execution vulnerability in the anti-virus engine powering Symantec’s endpoint security …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous