Carrier IQ bug did allow some SMS recording
Carrier IQ, the mobile analytics company that has lately been in the midst of a battle to prove that their CarrierIQ software didn’t log private information, has …
Mobile pickpocketing and botnets will rise
Mobile threats are on the rise — Lookout estimates that mobile threats successfully stole more than one million dollars from Android users in 2011. In 2012, Lookout predicts …
Top 5 authentication predictions for 2012
Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …
Yahoo! Mail now with second sign-in verification
More than a year after Google rolled out 2-factor authentication for its Gmail service, Yahoo! is finally beginning to add the option for its users. Owners of a Yahoo! Account …
Windows Phone 7.5 bug disables messaging option
A bug in the recently released Windows Phone 7.5 mobile OS can be exploited to make people’s phones lose the ability to send messages by cutting access to the messaging …
Cloud computing certification
With the use of cloud computing expanding and the demand for IT workers with cloud skills growing, CompTIA introduced a new specialty certification focused on cloud computing …
Virtualization can transform data protection
According to a Vanson Bourne survey of 500 CIOs virtualization has the potential to transform data protection. In order to achieve this, greater strides need to be made in …
Mobile VPN client for Android
Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …
Microsoft patches 19 vulnerabilities
For the December Patch Tuesday, Microsoft released thirteen security bulletins that fix vulnerabilities targeting Windows, Internet Explorer, and Office. Three are marked as …
12 hacking groups are behind most Chinese cyber attacks
Eastern European and Russian hackers mostly steal financial information, while Chinese ones are mainly after intellectual propriety or other sensitive data, say security …
Nitro attackers still at it, mock Symantec
Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically …
Sykipot Trojan takes advantage of Adobe Reader zero-day flaw
AlienVault Labs researchers have unearthed a piece of malware that takes advantage of the recently discovered zero-day Adobe Reader flaw used for attacking defense …
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects