Please turn on your JavaScript for this page to function normally.
Tool for creating booby-trapped PDFs made public

Freelance security researcher Claes Spett has made available a tool he dubbed “PDF Exploit Generator,” which allows penetration testers – but also malicious …

Automatic updating of Android apps becomes riskier

Google has made unwelcome changes to the way new app permissions are disclosed to users: no warnings will be shown if a new permission if is in the same category as an old one …

Advanced cyber attacks rely on privileged credential exploitation

While new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage …

Life after TrueCrypt

While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …

Top 10 most trustworthy online retailers

The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor …

GFI Cloud gets remote control and screen sharing

GFI Software announced the addition of remote control and remote access capabilities as part of a major update to GFI Cloud, the company’s IT platform for SMBs. GFI …

Microsoft battles US search warrant requesting customer emails stored abroad

Microsoft is battling a search warrant that could have a great impact on the future of US tech companies in the global market. Late last year, a federal magistrate judge in …

How apps and extensions affect your browsing

Google has announced the newest version of the Chrome Apps & Extensions Developer Tool, which helps developers debug apps and extensions, and power users to see which …

iOS 8 will randomize devices’ MAC address to increase privacy

The next major release of Apple’s iOS mobile operating system will include an important change: when local wireless networks scan for devices in range, devices running …

Is your data already out there?

CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …

Payment card breach at US restaurant chain P.F. Chang’s

Asian-themed US restaurant chain P.F. Chang’s China Bistro has apparently suffered a breach that resulted in the theft of customers’ payment card data. The extent …

Mobile apps will have a significant impact on information infrastructure

With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner. Gartner …

Don't miss

Cybersecurity news