Please turn on your JavaScript for this page to function normally.
iOS flaw used to bypass iPhone’s lockscreen

The passcode lock in iPhones running iOS 6.x can be bypassed and anyone can access the photos, address book, make phone calls and send messages and emails from it, and more, …

Mobile network infections increase by 67%

Kindsight released a new report that reveals security threats to home and mobile networks, including a small decline in home network infections and an increase in mobile …

Successful ways of undermining cybercrime ecosystems

Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that …

Video: Pirate Party MEP talks online child safety

Children and teenagers benefit hugely from being online, but they can also be targets of crime and exploitation as in any other environment. Child safety online is listed as …

Symantec unveils new SSL algorithms and web security products

Symantec unveiled new updates to its Website Security Solutions portfolio with capabilities to meet the increasing security and performance needs for connected businesses. The …

Reactions to Obama’s Executive Order on cybersecurity

On February 12, we have witnessed U.S. President Barack Obama sign an Executive Order and issue a Presidential Policy Directive aimed at improving the cybersecurity of …

LA Times website redirected users to exploit kit for over six weeks

A sub-domain of Los Angeles Times’ website has been redirecting visitors to compromised websites hosting the latest version of the Blackhole exploit kit for over six …

Adobe offers mitigation for Reader 0-day attack, fix is yet to come

Adobe has confirmed FireEye researchers’ findings about new Adobe Reader and Acrobat zero-day vulnerabilities being exploited in the wild and has issued a security …

Cloud computing in critical information infrastructure protection

ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …

Phishing campaigns run rampant on social networks

In January, GFI threat researchers identified a number of social network-based cybercrime attacks, including phishing messages on Twitter and Facebook, as well as malicious …

11 arrested in takedown of prolific ransomware gang

The Spanish Police, working closely with the European Cybercrime Centre (EC3) at Europol, have dismantled the largest and most complex cybercrime network dedicated to …

Infosec pros don’t trust their own networks

A SafeNet survey of 230 United States security professionals, revealed that, despite continued investments in network perimeter technologies, respondents are not confident …

Don't miss

Cybersecurity news