
SpyNote Android RAT builder has been leaked
A builder for the capable SpyNote Android RAT is being freely distributed on several underground hacker forums. SpyNote is capable of viewing messages on the infected device, …

European privacy advisor wants encryption without backdoors
“The confidentiality of online communications by individuals and businesses is essential for the functioning of modern societies and economies. The EU rules designed to …

Business and IT decision makers are aligned on key IT trends
Business decision makers’ (BDMs) and IT decision makers’ (ITDMs) understanding of current IT trends are much closer than they are generally perceived to be, according to a new …

Virtually all business cloud apps lack enterprise grade security
Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 …

Businesses need to protect data, not just devices
As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. More companies are moving away from device-centric, …

Pwnie Express open sources IoT and Bluetooth security tools
Pwnie Express announced the availability of open sourced versions of its Blue Hydra and Android build system software. The release of these tools enable comprehensive …

IOActive offers offensive security approach to risk assessment
IOActive launched its Advisory Services practice, offering strategic security consulting that leverages IOActive’s testing and research expertise to help customers …

Investigating the supply on 17 underground hacker markets
Have you ever wondered what kind of malicious offerings can be found on dark web “hacker markets,” who sells them and how widely they are available? Three …

Media-stealing Android app targets developers
Symantec researchers have unearthed another app on Google Play that secretly steals photos and videos from victims’ mobile devices. But the curious thing is that it’s …

How Google protects the Android kernel, and future plans
On Wednesday, Jeff Vander Stoep of Google’s Android Security team took to the official Android Developers blog and shared some information about the defenses they have …

Cybersecurity talent crisis continues, technical skills in high demand
Intel Security, in partnership with the Center for Strategic and International Studies (CSIS), has released a global report outlining the talent shortage crisis impacting the …

Infection Monkey: Test a network from an attacker’s point of view
Infection Monkey, a tool designed to test the resiliency of modern data centers against cyber attacks, was developed as an open source tool by GuardiCore’s research …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices