One in four UK consumers have had online accounts hacked
As user engagement with ecommerce sites and online services inevitably increases in the run up to Christmas, almost a quarter (24 per cent) of UK consumers have had their …
Top security trend predictions for 2014
AppRiver released its list of the top IT security trend predictions for 2014. They predict organizations will see the following in 2014: State-sponsored attacks and cyber …
Flaw in Nvidia’s rendering software allows hijacking of “computer farms”
A vulnerability in Nvidia mental ray, an extremely popular 3D-rendering software that is often used on “render farms”, could allow attackers to take control of …
Facebook users hit with phishing and malware combo attack
An interesting phishing / malware delivery campaign has been spotted targeting Facebook users. It all starts with a message from a Facebook friend, claiming that the user or …
64-bit Zeus Trojan version found and analyzed
Infamous banking Trojan Zeus can now be used to steal information via 64-bit versions of web browsers, and has the capability of connecting to its C&C server via the Tor …
What do people want to hide on their smartphone?
More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …
How cyber squatters and phishers target antivirus vendors
Illegal online activities such as phishing and typosquatting are growing at an alarming rate. To understand the issue in detail High-Tech Bridge analyzed 946 domains that may …
Young professionals exposing workplaces to cyber attack
Low cyber-threat awareness amongst Gen-Y professionals coupled with blasé attitudes towards cyber security are leaving organizations across the country exposed to attack and …
Flawed Android app devkit puts users in danger of MitM attacks
In this age of prevalently free software and services, it’s difficult to make users pay for apps, and especially so in the Android ecosystem. Consequently, mobile app …
Energy-efficient bcrypt cracking
Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …
Security is the biggest obstacle for moving data to Office 365
CipherPoint revealed the findings of its first State of Collaboration Security Report highlighting security issues with collaboration platforms such as Microsoft SharePoint, …
NSA uses Google cookies to track and target suspects
Newly published documents from Edward Snowden’s trove show that the NSA and its British counterpart GCHQ use Google’s “preferences” cookies to follow …