Please turn on your JavaScript for this page to function normally.
Google: We didn’t access Arrington’s Gmail account to identify leaker

In the wake of the revelation that Microsoft has accessed a blogger’s Hotmail account in order to discover the identity of an employee who leaked company trade secrets, …

Cerberus app users warned about data breach

Users of the Cerberus anti-theft Android app have been receiving warnings from the Cerberus Security Team, urging them to change their password as they have been reset in the …

Hidden crypto currency-mining code spotted in apps on Google Play

You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …

Analysis of 244,703 DDoS incidents

NSFOCUS released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report includes statistical analysis and key observations …

Are cybercriminals targeting your tax return?

Iovation is advising businesses and consumers about how to protect data and personal information to avoid identity theft during tax season. As the IRS has made it more …

Infographic: A phishing email’s route through the corporate network

For years, even decades, computer security has been seen as a technical problem that requires a technical solution. In recent years, enterprises have plowed billions of …

Retailers urge adoption of PIN-based credit cards

The National Retail Federation told the Senate that it’s time for an overhaul of the nation’s fraud-prone credit and debit card system, saying banks’ …

Surveillance is driving organizations away from the cloud

A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping, with the majority of them preferring to store sensitive …

Natural Security Alliance releases specs for strong authentication standard

The Natural Security Alliance has released the newest specifications for its world first strong authentication standard. The standard defines a strong authentication method, …

Banks sue Target and Trustwave for damages due to data breach

The Target data breach was one of the biggest in recent history, and has been calamitous for more than just the customers who have had their information stolen. The latest …

Facebook boasts of superior threat detection system

Facebook has a new internal threat-catching framework that is fed with disparate data from all over the Internet, different vendors, and Facebook’s internal sources, and …

ACLU probes US police’s use of fake cell towers

The American Civil Liberties Union (ACLU) is on a mission to find out which local and state law enforcement forces in the US are using “stingrays” and how, but are …

Don't miss

Cybersecurity news