Vulnerabilities in security software leave users open to attacks
In most people’s minds, antivirus and security software equals better security. But thanks to security researchers who have taken it upon themselves to analyze some of …
The number of fingerprints stolen in OPM hack rose to 5.6 million
Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …
CUJO: Plug-n-play protection for all devices
CUJO is a smart device that brings business level Internet security to guard all of your connected home devices. It’s simple to start with no installation necessary.You …
Healthcare industry sees 340% more security incidents than the average industry
Raytheon|Websense examined the current state of cyber threats and data-stealing attacks against an increasingly digital healthcare industry. Healthcare is highly-targeted and …
Free WordPress plugin for a password-free login
Nearly 25 percent of the Internet runs on WordPress, and now these sites can be more secure thanks to a free WordPress plugin available from LaunchKey.The plugin enables …
Chinese promotion company hijacks Android devices around the world
“A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this …
Apple tackles the XcodeGhost crisis by removing apps, alerting devs and users
“The XcodeGhost incident has demonstrated that however secure a system is thought to be, there’s always a way in. It also shows how the very human tendency of …
Using external URL shorteners for internal needs may lead to sensitive data leaks
Using external URL shortener services to create better-looking links to internal company documents, sensitive files and internal websites is a practice that company employees …
Killing computer infrastructures with a bang!
In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …
WD My Cloud NAS devices can be hijacked by attackers
Researchers with security consultancy VerSprite have unearthed several vulnerabilities in Western Digital’s My Cloud NAS product, which can be exploited by local and …
ENISA provides details on the complex cybersecurity exercise carried out in 2014
ENISA released the public version of the After Action Report of the pan-European cybersecurity exercise Cyber Europe 2014 (CE2014). This report, approved by the Member States, …
Firefox 41 includes critical security updates
Mozilla released Firefox 41.. This latest version comes with includes four critical, five high, nine moderate and one minor security update.Fixed in Firefox 41: 2015-114 …