Please turn on your JavaScript for this page to function normally.
Scammers use Google glasses as lure

The great interest that the upcoming release of Google glasses has generated in the public is being actively exploited by cyber scammers, warns Trend Micro. Counting on the …

CloudLock unveils Community Trust Rating

CloudLock unveiled the Community Trust Rating as part of its Cloud Information Security Suite at RSA Conference 2013. The third-party application trust assessment system uses …

Google 2-step login verification flaw allows account hijacking

Duo Security researchers have found an easy way to bypass Google’s two-step login verification by capturing a user’s application-specific password. “To make …

Google account hijacking dramatically reduced

Google employs many security measures to thwart would-be Google account hijackers, and not all are highly visible as the two-factor authentication option introduced in 2010 …

Myanmar journalists targeted with state-sponsored Gmail attacks

Google has recently begun warning Myanmar journalists and editors about their Gmail accounts potentially being targeted by state-sponsored attackers. The warning – first …

Bogus cleaning apps on Google Play install backdoor on PCs

Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …

Ad network site hack results in popular sites flagged as malicious

Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …

The effectiveness of bug bounty programs

Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …

Google offers over $3M for breaking Chrome OS

With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …

Google searching for hardware alternatives to passwords

Passwords are on the way out, it seems. With current boom – and obvious success – of phishing, it’s time to see what could be a better alternative to this …

Fake game apps flood Google Play

Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …

Automated YouTube account generator offered to cyber crooks

You’re a spammer / malware peddler / phisher, and want to register hundreds of bogus accounts on a popular online service such as YouTube in order to lead users to your …

Don't miss

Cybersecurity news