Please turn on your JavaScript for this page to function normally.
Police unable to decrypt iPhones, asks Apple to do it

Court documents from a drug trial in Kentucky have revealed that the U.S. federal Bureau of Alcohol, Tobacco, Firearms and Explosives nor any other U.S. local, state, or …

Scammers combine fake AV and bogus support calls

Scammers have found a new way of relieving unsuspecting victims of their hard earned cash: they have begun combining fake AV with fake support calls. The scam begins with …

Font apps on Google Play deliver spyware

Everybody should know by now that downloading apps from Google Play is not as safe as we all would like. Admittedly, the probability of downloading malware is much smaller …

No money mule, no problem: Recruitment website kits for sale

A valuable asset in the fraud world, money mules enable cybercriminals to cash out stolen money. After cybercriminals take over a victim’s account, they enlist the help …

Can mobile devices be more secure than PCs?

Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …

Open source NAC PacketFence 4.0 released

PacketFence is a fully supported, trusted, free and open source NAC solution. Among the features provided by PacketFence, there are: BYOD workflows Guests management Multiple …

Week in review: Malware you can “live with”, but should’t, and backdoor targeting popular web servers

Here’s an overview of some of last week’s most interesting news, videos, interviews, reviews and articles: Malware you can “live with”, but …

Academic institutions urged to improve network and DNS configurations

The Research and Education Networking Information Sharing and Analysis Center (REN-ISAC) has issued an alert to IT security staff, and network and DNS administrators urging …

Eight indicted in $45M cybercrime campaign

A four-count federal indictment was unsealed in Brooklyn charging eight defendants with participating in two worldwide cyberattacks that inflicted $45 million in losses on the …

Hijacking Facebook accounts via expired Hotmail accounts

Three researchers from Rutgers University in Newark, New Jersey, have discovered a simple way to hijack Facebook accounts by just by misusing existing features and responses …

India has a new National Cyber Security Policy

The Indian government has approved the proposed National Cyber Security Policy, which is aimed at creating a “secure computing environment and adequate trust and …

Microsoft to release 10 bulletins

It is the week before Patch Tuesday May and Microsoft has published its Advance Notification, giving us insight into what to expect next Tuesday. There will be 10 bulletins …

Don't miss

Cybersecurity news