
Growing security negligence in the workplace
A surprising disconnect exists between employees’ growing concern over the security of their personal information and their attitudes toward data security practices in …

Encryption securing money transfers on mobile phones can be broken
A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …

Carbanak cyber-thieves’ newest attacks exposed
The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …

iOS zero-day breaks Apple’s iMessage encryption
A team of Johns Hopkins University researchers headed by computer science professor Matthew Green have discovered a zero-day flaw in Apple’s iOS encryption, which could …

Google offers binary comparison tool BinDiff for free
In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …

Insider threat protection with the DB Networks DBN-6300
Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new …

Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …

Demand for advanced DDoS mitigation on the rise
The increasing popularity of DDoS attacks as a tool to disrupt, harass, terrorize and sabotage online businesses is boosting demand for mitigation solutions. In the face of …

Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in
Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in Here’s an overview of some of last …

It’s official: The FBI says car hacking is a real risk
With a public service announcement compiled jointly with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI has announced …

Android adware infiltrates devices’ firmware, Trend Micro apps
Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …

MITRE offers temporary solution to the CVE assignment problem
MITRE’s short-term solution to the problem of slow CVE assignment is to set up an experimental system for issuing federated CVE IDs using a new format. “(…) …