Millions of infected Android apps… or not?
Over the weekend, several websites picked up Symantec’s story about Trojanized apps on the official Android Market. This happens from time to time, but what got …
Cisco updates switching portfolio
According to the Cisco Cloud Index, more than 50 percent of computing workloads in data centers will be cloud-based by 2014, and global cloud traffic will grow more than 12 …
Malware redirects bank phone calls to attackers
Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …
Detecting the DNS Changer malware
January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …
(IN)SECURE Magazine issue 33 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 33 has been released today. Table of contents: …
Romanian hacker TinKode allegedly arrested
A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …
Defense companies persistently targeted by cyber spies
Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …
Fake Tumblr Staff Blog offers still targeting users
A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …
Sophos wireless access point supports 5 GHz connections
Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …
The Tangled Web: A Guide to Securing Modern Web Applications
Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application …
Counterclank: Info-stealing Trojan or advertising tool?
A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …
Law firms get hacked for deal data
A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool