Adware installer gives itself permission to access Mac users’ keychain
“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …
An emerging global threat: BEC scams hitting more and more businesses
As more and more victims come forward, and the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning …
Five years of hardware and software threat evolution
McAfee Labs commemorates the five-year anniversary of the Intel-McAfee union by comparing what researchers thought would happen beginning in 2010 with what actually happened …
Ashley Madison-themed blackmail, data deletion scams hitting inboxes
In the wake of the Ashley Madison hack and consequent data leaks, blackmailers and scammers are doing their best to extract as much money and information as it’s …
49 new Regin backdoor modules discovered
“Since Symantec and Kaspersky Lab researchers presented their findings on the Regin backdoor late last year, there has been only one additional publicly revealed …
How Linux Foundation sysadmins secure their workstations
Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations, as Konstantin Ryabitsev, Director of …
Hope is not a strategy, we need more healthy paranoia
35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership “relying on hope as a strategy” …
Should the removal of personal info posted online be a human right?
69% of online Americans agree that the ‘Right to be Forgotten’ should be a human right, 29% think it allows for censorship. Only 16% think the ‘right to be …
EMEA organizations are being pre-emptive about security
In EMEA, organisations are being pre-emptive about security due to the increasing threat posed by targeted attacks. These threats take the form of cyber-attacks that lie …
5 reasons Security Congress is the (ISC)2 member event of the year
The fifth annual (ISC)2 Security Congress, co-located with the 61st annual ASIS International Annual Seminar and Exhibits, is scheduled for September 28 through October 1 in …
Over 225,000 Apple accounts compromised via iOS malware
“Researchers from Palo Alto Networks and China-based WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in …
Spotting malicious apps on Android markets just got easier
“Spotting malicious apps before they are offered for download and/or removing them is a tough challenge for every online Android app marketplace, including Google Play, …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise