Please turn on your JavaScript for this page to function normally.
Facebook bug leaked more info than company reported?

Last Friday, Facebook tried to make its latest disclosure of an information-leaking bug as low-key as possible, but luckily there were researchers who actually analyzed the …

Facebook squashes critical account hijacking bug

A U.K.-based security researcher has shared details of a recently patched Facebook vulnerability that he discovered and for which he received $20,000 via the the social …

Opera infrastructure compromised, users hit with malicious update

A breach of the Opera Software internal infrastructure has resulted in the theft of an expired Opera code signing certificate and used it to sign a piece of malware, package …

Citadel Trojan automatically localizes fraud content

Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …

Attitudes towards data protection and encryption in the cloud

An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …

Can DDoS attackers turn mitigation devices against you?

SYN reflection attacks are one of the more sophisticated DDoS attack methods and typically require some skill to execute. However, they have recently grown in popularity as …

Data-slurping Facebook Graph Search flaw revealed

A mobile developer has discovered what he claims is a security vulnerability in the Facebook Graph Search that allowed him to automate the compilation of a list of some 2.5 …

Mobile and cloud data risks exposed

A new Ponemon eport focuses on the risks associated with employee access to regulated data, such as protected health and financial information, via company or personal mobile …

Advanced threat detection from Cylance available for free

The Cylance PrivateDETECT for endpoints is now ready for broad beta consumption as limited time freeware. Cylance’s technological approach is to apply big math and …

Confirmed: Carberp source code leaked

It has been confirmed: the password-protected ZIP file that is currently sold on a number of underground forum does indeed contain the source code of the infamous Carberp …

Stolen laptop containing info on victims, suspects, witnesses and police

Some 2,300 individuals have been notified that they might become victims of identity thieves after a laptop and a personal hard drive belonging to an undercover officer of a …

Blizzard suspends mobile app access following account hijacks

A number of World of Warcraft players have been unpleasantly surprised this last week to find that someone has apparently broken into their accounts and bought low-level items …

Don't miss

Cybersecurity news