Gemalto says NSA and GCHQ intrusions “probably happened”
“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …
Researchers create automated signature compiler for exploit detection
A trio of researchers from Microsoft and University of Erlangen-Nuremberg have created Kizzle, a compiler for generating signatures for detecting exploit kits delivering …
Known weaknesses plague the security threat landscape
Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …
Addressing cybersecurity business disruption attacks
Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …
Critical Samba flaw allows unauthorized remote code execution
Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …
Google ups efforts to protect users against unwanted software
Google is looking to minimize its users’ exposure to potentially unwanted software, and to that end they have announced a few changes. For one, Chrome users will now see …
Fake face aging app steals Facebook login credentials
Offers for an app that can purportedly show you how you will look in 20 years have been recently popping up in Facebook users’ newsfeed and on their walls, occasionally …
Internet of Things adoption is gaining momentum
Enterprise adoption of the Internet of Things (IoT) is starting to gain momentum, fueled by a mix of technological, political and social factors. The declining costs of …
Insider threats continue to dominate
Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …
Mobile apps left vulnerable for months
McAfee Labs researchers found that mobile app providers have been slow to address the most basic SSL vulnerabilities: improper digital certificate chain validation. In …
Superfish not the only app using Komodia’s SSL-busting code
As Lenovo backtracked on its initial position that the Superfish adware pre-installed on some of its notebooks is not a security danger, and released a security advisory about …
CTOs targeted with tax-themed phishing emails carrying malware
Tax-themed phishing emails targeting CTOs of tech companies have been spotted by researchers at Talos, Cisco’s security intelligence and research group. The initial …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground