Researchers identify malware threat to virtual currencies
INTERPOL and Kaspersky Lab have identified a threat to the blockchain in virtual transactions that could result in them being embedded with malware or other illegal data. …
Amazon Cloud Drive now with unlimited cloud storage
Amazon announced unlimited cloud storage with Amazon Cloud Drive—two new storage plans for customers to securely store their existing content collections and automatically …
Apple-themed “Your account has been limited” phishing emails doing rounds
Apple users are once again targeted with phishing emails, warns Bitdefender, and the latest variant of the scheme is impersonating Apple Support claiming that their account …
Xtube visitors redirected to exploit kit landing page
Popular adult site Xtube has been compromised to redirect visitors to sites hosting an exploit kit. “Unlike other attacks we have seen in recent times, this one does not …
How companies secure their cloud data
As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud …
Huge spam operation on Twitter uncovered
What does it take to execute a successful spam operation peddling diet pills of questionable effectiveness? For one spammer, it took some 750,000 fake Twitter accounts. …
Researcher finds backdoor opened by Dell’s helper app
A security researcher has discovered a serious bug in Dell System Detect, the software Dell users are urged to use to download the appropriate drivers for their machines. The …
Multifunctional Vawtrak malware now updated via favicons
The Vawtrak (aka Snifula) multifunctional malware has been around since mid-2013. Its information-stealing, backdoor and spying capabilities deservedly earned it the …
Macro-based malware continues to gain traction
After having “rediscovered” the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to …
Half of all Android devices vulnerable to installer hijacking attacks
A critical Android vulnerability that has been discovered over a year ago and responsibly disclosed to Google and other Android manufacturers can be exploited by attackers to …
15,435 vulnerabilities across 3,870 applications were recorded in 2014
In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …
Mobile apps are not being tested for insecure behavior
Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …
Featured news
Resources
Don't miss
- Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
- Turning cyber metrics into decisions leaders can act on
- Teaching cybersecurity by letting students break things
- There was no data breach, Instagram says
- Crypto crime hits record levels as state actors move billions