“Honey Encryption” overwhelms attackers with fake results
Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …
New details about Target breach come to light
As data dumps of cards stolen in the Target breach continue to be sold on underground cybercrime forums, and the stolen information is being used to perform unauthorised …
Check Point discovers critical vulnerability in MediaWiki
Check Point found a critical vulnerability in the MediaWiki project Web platform, a popular open source Web platform used to create and maintain ‘wiki’ Web sites. …
Risky online behaviour is putting teens in danger
Research by McAfee and the Anti-Bullying Alliance has found that 14-15 year old teenagers are most likely to adopt risk-taking behaviours and overshare online; putting …
Angry Birds website defaced by “anti-NSA” hacker
The official website of the popular Angry Birds game by Finnish company Rovio has been briefly defaced on Tuesday night, and has been made to sport the following image: The …
VPN bypass attack possible also on Android KitKat
Security researchers at Ben Gurion University in Israel are on a roll when it comes to discovering Android security flaws, and they revealed the existence of a critical flaw …
Many Android apps can track your location, access photos
An alarming proportion of Android applications can find and open private photographs on smartphones, track users’ locations, divulge e-mail addresses over the internet …
Java-based malware hits Windows, Mac and Linux
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it …
SpyEye creator pleads guilty
Aleksandr Andreevich Panin, a Russian national also known as “Gribodemon” and “Harderman,” has pleaded guilty to conspiracy to commit wire and bank …
Surge in mobile network infections affects millions of devices
Security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen …
Consumers care more about business data collection than government surveillance
TRUSTe released its latest U.S. Consumer Confidence Index, which shows that a high proportion of U.S. adults aged 18 and older are worried about their privacy online, online …
IT underestimates cloud app usage by 90%
Cloud app adoption continues to spread across virtually every business function, from marketing to human resources. However, while enterprise app use continues to grow, …
Featured news
Sponsored
Don't miss
- Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32
- Authentik: Open-source identity provider
- Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches