Please turn on your JavaScript for this page to function normally.
Android
Mobile banking Trojan bypasses Google Play security

The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …

mitmproxy
Intercept, inspect and modify traffic flow with mitmproxy

mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …

Gmail
Gmail to warn when email comms are not encrypted

From now on, Gmail users will be able to see whether their communications with other email account holders – whether Gmail or any other email service – is secured. …

Google
Google declares war against deceptive download buttons

There’s likely no Internet user that hasn’t, at some point, been tricked into clicking on a deceptive “download,” “install,” or …

Comodo Dragon
Comodo Internet Security installs insecure Chrome-based browser

Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …

Malwarebytes
Revelation of security bugs jumpstarts launch of Malwarebytes’ bug bounty program

Malwarebytes CEO Marcin Kleczynski has announced that the company has launched a bug bounty program in an effort to make its software more secure. “The Coordinated …

Android
Google plugs five critical Android vulnerabilities

Google has plugged nine Android security holes with its February Nexus security update. Of these, five are critical, four of high and one of moderate severity. Here’s …

Android
60+ Trojanized Android games lurking on Google Play

Dr. Web researchers have discovered over 60 Trojanized game apps being offered on Google Play through more than 30 different game developer accounts. The games are made to …

Steam
Malicious Chrome extensions ransack Steam users’ inventory

Steam users are being targeted by a scammer that’s offering apparently helpful Chrome extensions for free, but is actually using them to steal items from victims’ …

Google
Review: Google Hacking for Penetration Testers, Third Edition

Authors: Johnny Long, Bill Gardner, Justin Brown. Pages: 234 Publisher: Syngress ISBN: 0128029641 Introduction The Internet can be a great source of information, and Google …

email
How email in transit can be intercepted using DNS hijacking

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on …

jigsaw
Attackers use SQL injection to manipulate search engine rankings

Akamai has identified a sophisticated SEO campaign that uses SQL injection to attack targeted websites. Affected websites will distribute hidden HTML links that confuse search …

Don't miss

Cybersecurity news