Android malware masquerading as legitimate AV apps
If you’re an Android user, you probably couldn’t help but notice the hundreds of articles about the proliferation of malware created specifically for that …
Apple, Amazon change their security policies following epic hack
In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …
Beware of “Free Apple Product” SMS messages
Given the all-around popularity of various Apple devices, it’s no wonder scammers often “offer” them as prizes in bogus contests and lotteries. The latest of …
Trend Micro unleashes big data analytics
Trend Micro announced an expansion of the Trend Micro Smart Protection Network, the cloud-based security infrastructure that powers most of the company’s products and …
SignatureLink introduces all-in-one ecommerce fraud solution
Until now, ecommerce fraud solutions accomplished one objective: screen out online payment fraud based on site visitor behaviors, devices, and other criteria. The …
Alert Logic launches SaaS web application firewall
Alert Logic announced the availability of Alert Logic Web Security Manager with ActiveWatch to protect web applications against threats and attacks. The solution combines WAF …
Iran government systems to be taken off the Internet for protection
Remember when Iran expressed its intention of setting up a national Internet disconnected from the World Wide Web in order to keep its citizens safe from Western ideas and …
Reuters hack was due to old WordPress version
While the individuals responsible for the recent hijacking of Reuters’ blogging platform and one of its Twitter accounts are still unknown, it has emerged that the …
Gizmodo hack reveals worrying flaws in data management policies
Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
Quantum cryptography theory has a proven security defect
Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …
Employees targeted with faked emails from payroll services firms
Administrators at companies that outsourced payroll management to outside firms have recently been heavily targeted with malicious emails supposedly coming from those very …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)