Please turn on your JavaScript for this page to function normally.
New technique targets C code to spot malware attacks

Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on …

Cybersecurity concerns becoming a boardroom issue

The increasing frequency, sophistication, and business impact of cyber-attacks have pushed cybersecurity planning and protection from an operational concern of IT departments …

Microsoft’s quest to make users drop Windows XP continues

As the date of the scheduled retirement of Windows XP – arguably one of Microsoft’s most popular products ever – draws near, the company continues its quest …

Major gaps found in the governance of emerging technologies

SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …

GnuTLS library flaw opens way for MitM attacks

A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software …

New Android devices sold with pre-installed malware

A wide range of smartphones and tablets manufactured by Samsung, Motorola, Asus and LG Electronics have apparently been compromised with malicious apps before being sold to …

Cryptocat now available for iPhone

Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple’s App Store), as well. …

73% of companies are unprepared for disaster recovery

The Disaster Recovery Preparedness (DRP) Council announced findings from its benchmark study which show that 73% of respondent organizations worldwide are not taking adequate …

More Bitcoin thefts, Bitcoin bank Flexcoin shuts down

Mere days after Mt. Gox filed for bankruptcy, “Bitcoin bank” Flexcoin and Bitcoin exchange Poloniex have announced that they have been successfully targeted by …

Three-year-old Uroburos rootkit likely created by Russian state-sponsored hackers

Researchers from German antivirus company G Data have discovered and analyzed a complex rootkit with spying capabilities and believe that it has been created and employed by …

300,000 routers compromised in DNS hijacking campaign

Some 300,000 confirmed – but most likely many more – small office/home office (SOHO) routers have been compromised and their DNS settings changed to use two IP …

Four trillion security transactions reveal security highlights

In 2013, CYREN analyzed more than four trillion security transactions worldwide – averaging 10 to 15 billion transactions per day. There’s been a marked increase …

Don't miss

Cybersecurity news