Please turn on your JavaScript for this page to function normally.
Google increases rewards for Chromium bug reports

It has recently been proved that setting up bug bounties is a cheaper option than hiring full-time bug hunters, and Google’s two bug bounty programs – Google Web …

Windows XP’s approaching retirement will be boon for blackhats

Windows XP, one of Microsoft’s most popular products ever, is scheduled to be retired in April 2014. This means that from that moment on, no updates patching security …

Android security flaw puts Bitcoin users at risk

The Bitcoin Foundation has issued a security advisory warning users that have generated their Bitcoin wallet with an Android app that their Bitcoins can be easily stolen. The …

Microsoft to release three critical fixes

The August 2013 Patch Tuesday advance notification includes a slightly higher volume of fixes than last month, but only 3 of 8 are critical, which is down from July’s 6 …

Compromising Google Accounts and enterprises via flaw in Android SSO

When it comes to Android, Google has traded security for convenience, says Tripwire security researcher Craig Young. During his recent presentation at Def Con in Las Vegas, he …

Advice on Tor use in wake of Freedom Hosting compromise

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …

Tor users targeted with spyware following anonymous Web-host shutdown

The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …

Free tool identifies risks in secure shell environments

SSH Communications Security, known the world over as the inventor of the ubiquitous Secure Shell and SFTP protocols, today announced the general availability of SSH Risk …

Microsoft announces MAPP overhaul

Introduced in 2008, the Microsoft Active Protections Program (MAPP) was created to give antivirus vendors a head start against malware developers. Vendors would get …

Preventing the exploitation of human vulnerabilities

Secure Mentem released the Human Incident Response Service to specifically address the issue of exploiting human vulnerabilities. Some of the most noted attacks in recent …

Malicious apps exploiting Android “Master Key” bug found

Malicious apps misusing on of the two recently discovered Android “Master Key” bugs to successfully pose as legitimate ones have been discovered on third-party …

SIM encryption flaw opens 500M users to attack

A flaw in the encryption technology used by some SIM cards can allow attackers to make the target phone download malicious apps and even effectively clone a user’s card …

Don't miss

Cybersecurity news