Secret ad code allows Google to bypass Safari’s “no tracking” settings
Once again, Google has been caught doing something that it shouldn’t be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in …
How mobile malware is maturing
Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating …
Ransomware impersonates the Italian police
Ransomware targeting Italian-speaking users is being served from compromised websites via malicious JavaScript code, warns Total Defense’s Rossano Ferraris. The users …
Fake Facebook notification delivers keylogger
Fake Facebook notifications about changes in users’ account information have been hitting inboxes and delivering malware to unwary users, warn BarracudaLabs researchers. …
New powerful bot spreads by email
PandaLabs reported the presence of a powerful new bot called Ainslot.L. This malware is designed to log user activities, download additional malware and take control of …
Analyze mobile apps for malware threats
Trend Micro announced Mobile App Reputation, a technology that can automatically identify, analyze and rate mobile applications for issues that could include malware, …
Cloudify cloud application platform
GigaSpaces Technologies announced Cloudify, a cloud application platform that enables organizations to easily on-board and manage any application, on any cloud, with zero code …
Imation secures mobile data, identity and workspaces
Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …
Cloud-based threat monitoring and response service
FishNet Security launched ThreatDetect, a cloud-based threat monitoring and response service, that allows organizations to proactively respond to emerging threats, meet …
Premium rate phone firms heavily fined for typosquatting
PhonepayPlus, the regulatory body for all premium rate phone-paid services in the UK, has ordered two Amsterdam-based companies to pay a fine of 100,000 pounds each and to …
Thwarting attacks with genetically-inspired computer configuration systems
In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …
Social mobile apps found storing users’ contacts without permission
A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades