iOS 9 partially fixes critical, easily exploitable AirDrop bug
Apple has released iOS 9. Along with many new and improved security and privacy features, fixes for a bucketload of security vulnerabilities have been included in this latest …
Behind the scenes at BruCON, a European hacker conference
Setting up a local conference seems to be a popular way for infosec pros that haven’t got the time or means to travel to bring the people they want to meet and the …
Big Data investments on the rise
Investment in big data continues to increase in 2015, but not as rapidly as in previous years. More than three-quarters of companies are investing or planning to invest in big …
New POS Trojan created by mixing code from older malware
“A newly discovered POS Trojan is a perfect example of how easy it is for malware makers to come up with new malware – they can simply recycle code used in older …
80% increase of malware on Windows devices
“Alcatel-Lucent estimates that 80 percent of malware infections detected on mobile networks during the first half of 2015 have been traced to Windows-based computers. …
Malware takes screenshots of the infected players virtual poker hand
“Malicious spyware is targeting users of Full Tilt Poker and PokerStars online games, ESET researchers have revealed. The spyware, named Odlanor, takes screenshots of …
Microsoft details how Device Guard fights malware in Windows 10
As Windows 10 was being prepared for release, Microsoft presented many new security features (and we’ve written about some) to be included in the new version of the …
Persistent XSS flaw in SharePoint 2013 revealed, patched
Among the vulnerabilities patched earlier this month by Microsoft is an important one that endangers users of Microsoft SharePoint 2013, a web application platform in the …
(IN)SECURE Magazine issue 47 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 47 has been released today.Table of contents: …
Android 5 bug allows attackers to easily unlock password-protected devices
If you own a mobile device running any Android 5 version but the very last (v5.1.1) and you use a password to lock your device, you will want to update your OS or switch to a …
Container security concerns escalate
86% of IT decision makers say their companies already deploy containers, or they plan to do so within a year, according to Twistlock. Of these, 35% said containers are already …
Why background screening is vital for IT security
Which security controls are the most important in thwarting cyber crime against businesses? Anti-malware? Physical security? According to a recent survey, people are a main …