Fake, malicious World Cup-themed apps targeting Android users
The 2014 FIFA World Cup in Brazil start today, and Trend Micro researchers have pointed out yet another thing that fans need to be careful about: fake and malicious versions …
Tool for creating booby-trapped PDFs made public
Freelance security researcher Claes Spett has made available a tool he dubbed “PDF Exploit Generator,” which allows penetration testers – but also malicious …
Automatic updating of Android apps becomes riskier
Google has made unwelcome changes to the way new app permissions are disclosed to users: no warnings will be shown if a new permission if is in the same category as an old one …
Advanced cyber attacks rely on privileged credential exploitation
While new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage …
Life after TrueCrypt
While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …
Top 10 most trustworthy online retailers
The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor …
GFI Cloud gets remote control and screen sharing
GFI Software announced the addition of remote control and remote access capabilities as part of a major update to GFI Cloud, the company’s IT platform for SMBs. GFI …
Microsoft battles US search warrant requesting customer emails stored abroad
Microsoft is battling a search warrant that could have a great impact on the future of US tech companies in the global market. Late last year, a federal magistrate judge in …
How apps and extensions affect your browsing
Google has announced the newest version of the Chrome Apps & Extensions Developer Tool, which helps developers debug apps and extensions, and power users to see which …
iOS 8 will randomize devices’ MAC address to increase privacy
The next major release of Apple’s iOS mobile operating system will include an important change: when local wireless networks scan for devices in range, devices running …
Is your data already out there?
CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …
Payment card breach at US restaurant chain P.F. Chang’s
Asian-themed US restaurant chain P.F. Chang’s China Bistro has apparently suffered a breach that resulted in the theft of customers’ payment card data. The extent …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers