Over half of Android users fail to lock their phones
An ad hoc survey conducted by Google’s anti-abuse research lead Elie Bursztein has shown that over half of Android users don’t lock their phones in any meaningful …
Nmap’s Fyodor restarts the Full Disclosure mailing list
The Full Disclosure mailing list is back on track, with Nmap’s Gordon “Fyodor” Lyon picking up the mantle put down by John Cartwright. “Upon hearing …
Network, engage and do business at Infosecurity Europe
Infosecurity Europe is the largest and most attended information security event in Europe. Held in central London, it is a free event featuring over 325 exhibitors presenting …
SCADA risk awareness, threats and breaches
SANS announced results of its 2014 Survey on control system security, in which 268 IT professionals answered questions about their overall risk awareness, trends in threats …
Black markets for hackers are maturing
Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, …
Gameover ZeuS now targets users of employment websites
Some newer variants of the Gameover Zeus Trojan, which is exceptionally good at using complex web injections to perform Man-in-the-Browser (MITB) attacks and gain additional …
ATMs running Windows XP targeted with cash-dispensing malware
Microsoft has been aggressively campaigning to get users to stop using Windows XP, and has gone so far as to offer $100 off the purchase of a new PC via the Microsoft Store in …
Android bug can push devices into an endless reboot loop
A Proof-of-Concept app exploiting a recently discovered Android vulnerability that triggers the continuous rebooting of an affected device was apparently also behind the …
Five tips to reduce identity theft
Some Americans submitting their taxes this year will make the unpleasant discovery that someone else has already filed and stolen their refunds. Tax fraud claimed 1.2 million …
Tumblr now offers two-factor authentication
In a playful post on its official feed, Tumblr has announced that it’s now offering two-factor authentication to its users. “You know how you need two keys to …
Sogeti social engineering challenge at HITB Haxpo
For the third year in a row Sogeti organizes the social engineering challenge during Hack In The Box Amsterdam. In 2012 and 2013 they asked contestants to show weaknesses in …
0-day Microsoft Word flaw exploited in targeted attacks
Microsoft has issued a security advisory warning of a remote code execution vulnerability that is being exploited in “limited, targeted attacks directed at Microsoft …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends