Inside the malware war zone
Adam Kujawa is the Head of Malware Intelligence for Malwarebytes. In this interview he talks about the evolution of malware in the past decade, illustrates the differences in …
8 key cybersecurity deficiencies and how to combat them
While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations’ cybersecurity capabilities do not rival …
Employee behaviors expose organizations to insider threat
A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …
Fraud study finds MasterCard holding lowest fraud rate
2Checkout released a study of online payments fraud, based on a worldwide sample of approximately one million payment transactions tracked each quarter. Key findings: Discover …
Ineffective password security practices plague organizations
Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, according to Lieberman Software. …
Data brokers collect info on nearly every U.S. consumer
In a report issued on the data broker industry, the Federal Trade Commission finds that data brokers operate with a fundamental lack of transparency. The Commission recommends …
The cloud will transform the airport experience
Airports are increasingly identifying the need to switch to cloud systems in order to improve operational efficiencies, according to Amadeus, who collected the viewpoints of …
Outlook for Android fails to keep emails confidential
Did you know that Outlook and many other email and mobile messaging Android apps store your emails and messages on the device’s SD card, unencrypted, and accessible to …
Apps on your Android phone can take photos without you knowing
A researcher has demonstrated that it’s possible for malicious attackers to create an Android app that will surreptitiously take pictures and upload them to a remote …
Hybrid Zberp Trojan targets bank users around the world
A new threat created by the amalgamation of the publicly available code of two of the most (in)famous malware around is targeting users of over 450 financial institutions …
Large increase in PayPal-related phishing URLs
CYREN published its April 2014 Internet Threats Trend Report. Among its findings, they revealed a 73 percent increase in the number of phishing attacks aimed at PayPal users. …
Hacker hijacks Apple devices remotely, asks for ransom
An unusual case of cyber extortion has been spotted in Australia: Apple device users in Queensland, NSW, Western Australia, South Australia and Victoria have woken up to see …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous