Please turn on your JavaScript for this page to function normally.
Techniques used in high-profile data breaches

McAfee Labs released a new report, highlighting the role of the “dark web” malware industry as a key enabler of the high-profile POS attacks and data breaches in …

Week in review: Critical GnuTLS library flaw, and new Android devices sold with pre-installed malware

Here’s an overview of some of last week’s most interesting news, videos, and podcasts: Mt. Gox users targeted with fake promises of lost Bitcoin recovery Bitcoin …

Personal info of 12 million KT customers stolen and misused

Two men have been arrested in connection with the massive KT Corp. data breach that resulted in the theft of personal and financial information of some 12 million customers of …

Dendroid spying RAT malware found on Google Play

A new Android malware toolkit called Dendroid is being offered for sale by its creators, and at least one of the malicious APKs created with it has managed to fool Google …

Siesta cyber espionage campaign targets many industries

Trend Micro researchers have uncovered yet another cyber espionage campaign targeting a wide variety of industries including energy, finance, security and defense, and …

Using free Wi-Fi in Europe is risky

Internet users would do well to be extra careful when attempting to use public Wi-Fi hotspots in Europe, as hackers and cyber crooks have lately ramped up their efforts to …

SolarWinds enhances its Network Performance Monitor

SolarWinds announced further enhancements to SolarWinds Network Performance Monitor (NPM) that offer the robust network performance monitoring, alerting and reporting …

Upcoming Patch Tuesday looks small once again

Microsoft’s March Patch Tuesday is again shaping up to be on the lighter side of some months, continuing the 2014 trend of smaller Patch Tuesdays. We only see 2 issues …

European IT pros reveal top reasons to monitor privileged users

BalaBit IT Security announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring …

HTTPS can’t be trusted to obscure private online activity

HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …

Cybercriminals increasingly drawn to Tor anonymity and hidden services

Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …

A peek into China’s burgeoning mobile cybercriminal underground

Every country’s cybercriminal underground market has distinct characteristics, and with 500 million national mobile Internet users and the number continuously rising, …

Don't miss

Cybersecurity news