Uber’s on a hunt for the attacker that compromised its drivers’ database
Late last week, Uber’s Managing Counsel of Data Privacy Katherine Tassi has revealed that the company has suffered a data breach. One of its databases, which contains …
(IN)SECURE Magazine issue 45 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 45 has been released today. Table of contents: How …
0-day flaw in Seagate NAS devices endangers thousands
Seagate’s Business Storage 2-Bay NAS line of products, which is popular both with home and business users, sports a zero-day remote code execution vulnerability that can …
Beware of malicious LogMeIn Pro Payment emails
A fake LogMeIn-themed email has been hitting inboxes of users around the world, trying to trick them into believing that they have somehow paid nearly a thousand dollars for a …
Netflix phishing website targeting European users
A fake website simulating that of popular Internet video streaming Netflix has been set up to harvest European users’ personal and payment card information, warns …
A threat assessment of 7 million iOS and Android apps
Android malware is growing more pervasive, and iOS devices are also increasingly at risk. FireEye analyzed seven million mobile apps on both Android and iOS platforms from …
New versions of Tails and Tor Browser fix numerous security issues
Tails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Several …
The shift to secure apps in the enterprise
As enterprises are mobilizing content and apps, they are also fortifying their cyber resiliency with accelerated activations of secure mobile apps, which grew 65 percent …
Mobile security market to reach $34.8 billion by 2020
BYOD is adopted by most SMBs and large organizations, a major reason for the adoption of mobile security software. Smartphones are majorly adopted in Asia Pacific region and …
Week in review: Komodia SSL-busting code found in other software, critical Samba flaw, and black hole routing
Here’s an overview of some of last week’s most interesting news and articles: Is the Internet hiding a crime wave? The U.S. crime rate continues to fall, according …
Compromised cPanel “Account Suspended” pages redirect to exploit kit
All Internet users have, at least once in their lives, seen the following “Account Suspended” page: That’s because it’s part and parcel of cPanel, one …
Medical identity theft affected two million victims in 2014
The number of patients affected by medical identity theft increased nearly 22 percent in the last year, an increase of nearly half a million victims since 2013. In the five …
Featured news
Resources
Don't miss
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry