Please turn on your JavaScript for this page to function normally.
“Honey Encryption” overwhelms attackers with fake results

Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …

New details about Target breach come to light

As data dumps of cards stolen in the Target breach continue to be sold on underground cybercrime forums, and the stolen information is being used to perform unauthorised …

Check Point discovers critical vulnerability in MediaWiki

Check Point found a critical vulnerability in the MediaWiki project Web platform, a popular open source Web platform used to create and maintain ‘wiki’ Web sites. …

Risky online behaviour is putting teens in danger

Research by McAfee and the Anti-Bullying Alliance has found that 14-15 year old teenagers are most likely to adopt risk-taking behaviours and overshare online; putting …

Angry Birds website defaced by “anti-NSA” hacker

The official website of the popular Angry Birds game by Finnish company Rovio has been briefly defaced on Tuesday night, and has been made to sport the following image: The …

VPN bypass attack possible also on Android KitKat

Security researchers at Ben Gurion University in Israel are on a roll when it comes to discovering Android security flaws, and they revealed the existence of a critical flaw …

Many Android apps can track your location, access photos

An alarming proportion of Android applications can find and open private photographs on smartphones, track users’ locations, divulge e-mail addresses over the internet …

Java-based malware hits Windows, Mac and Linux

Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it …

SpyEye creator pleads guilty

Aleksandr Andreevich Panin, a Russian national also known as “Gribodemon” and “Harderman,” has pleaded guilty to conspiracy to commit wire and bank …

Surge in mobile network infections affects millions of devices

Security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen …

Consumers care more about business data collection than government surveillance

TRUSTe released its latest U.S. Consumer Confidence Index, which shows that a high proportion of U.S. adults aged 18 and older are worried about their privacy online, online …

IT underestimates cloud app usage by 90%

Cloud app adoption continues to spread across virtually every business function, from marketing to human resources. However, while enterprise app use continues to grow, …

Don't miss

Cybersecurity news