Please turn on your JavaScript for this page to function normally.
Atypical cloned banking app pops up on Google Play

An unusual instance of a cloned banking app has been spotted on Google Play by Lookout researchers: the app steals only the users’ ID, and leaves alone the password. The …

Banking fraud campaign steals 500k euros in a week

The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the …

Drastic decline in vulnerable NTP servers due to Heartbleed?

In light of the escalation of DDoS attacks used as a means of extorting money from online businesses, the news that there has been a significant decrease in vulnerable Network …

Companies are afraid of the cloud

Although using cloud solutions can boost company efficiency, not every business has made the jump to cloud services. In a recent F-Secure survey of companies with up to 500 …

(IN)SECURE Magazine issue 42 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 42 has been released today. Table of contents: Six …

Top 10 technologies for information security in 2014

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …

Are CISOs too confident?

CISOs and IT managers may be too confident in their capabilities to ensure their organizations security and defenses against a data breach, according to Courion. A majority …

Symantec addresses global workforce gap in cybersecurity

Symantec launched a first-of-its-kind program, the Symantec Cyber Career Connection (SC3), to address the global workforce gap in cybersecurity and provide new career …

Improperly anonymized taxi logs reveal drivers’ identity, movements

Software developer Vijay Pandurangan has demonstrated that sometimes data anonymizing efforts made by governments and businesses are worryingly inadequate, as he managed to …

Capabilities of “lawful interception” mobile malware revealed

Researchers from Russian AV company Kaspersky Labs and the Citizen Lab of the University of Toronto have released details about the mobile surveillance tools provided by …

Havex malware targets ICS/SCADA systems

F-Secure researchers have, for a while now, been monitoring the spreading of the Havex malware family and have been trying to determine who are the attackers that wield it. …

Mobile security and incident readiness

AccessData and Gigaom Research released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that …

Don't miss

Cybersecurity news