Please turn on your JavaScript for this page to function normally.
Week in review: Linux systems ensnared in DDoS botnet and Home Depot breach

Here’s an overview of some of last week’s most interesting news, podcasts, and articles: IT security is a matter of accountability The CEO has always had …

Researchers compile list of Android apps that allow MitM attacks

Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …

Coursera privacy issues exposed

When well-known lawyer and Stanford law lecturer Jonathan Mayer was invited to teach a course on government surveillance on Coursera, the popular online website offering free …

HealthCare.gov breach affected test server, not users

A server within the Healthcare.gov system has been compromised, but the good news is that it didn’t contain consumer personal information. It was just a development …

OS X version of Windows backdoor spotted

A recently discovered backdoor aimed at Mac computers is likely wielded by a long-standing APT group that has previously been known to target US defense firms and …

91% of Americans have privacy concerns

A new survey, conducted by Harris Poll among 2,100 U.S. adults and developed by WP Engine, discovered that 91% of Americans are concerned about their online privacy, while …

Profit leads motives for malware engineers

With mobile malware doubling year after year, NQ Mobile released new data and background information outlining the current threat landscape and projecting trends for the …

Give up on complex passwords, says Microsoft

The Internet is full of advice on how users should go about choosing strong passwords, and on what schemes web admins should implement to make them do so and what protection …

Mounting evidence points towards Home Depot breach

Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened. As Nicole Perlroth noted, the source of stolen card information can be discovered …

Network vulnerabilities IT admins can use to protect their network

Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …

Twitter launches bug bounty program

With a simple tweet, Twitter has officially launched its own bug bounty program. Set up through the security response and bug bounty platform HackerOne, the program offers a …

80% of business users are unable to detect phishing scams

McAfee Labs revealed that phishing continues to be an effective tactic for infiltrating enterprise networks. Testing business users’ ability to detect online scams, the …

Don't miss

Cybersecurity news