Please turn on your JavaScript for this page to function normally.
Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims

A vulnerability in the Swift keyboard, which comes pre-installed on Samsung mobile devices, can be exploited by remote attackers to secretly install malicious apps, access the …

Exposing cyberattacks targeting government networks in Southeast Asia

Palo Alto Networks uncovered a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia. Help …

Risks from fraudulent mobile apps and unauthorized app stores

Companies spanning retailers, travel companies, media & entertainment, gambling firms and banks have far more mobile apps owned by them or referencing their brand than …

Newly patched Flash Player bug exploited to deliver crypto ransomware

“It took less than a week for a functional exploit for a recently patched Adobe Flash Player vulnerability to be added to the Magnitude exploit kit, Trend Micro …

Reactions to the LastPass breach

LastPass, the company behind the popular password management service of the same name, has announced that they have suffered a breach, and has urged users to verify their …

Google announces reward program for Android bugs

Google has announced that it will start paying researchers for information about vulnerabilities affecting Android.The Android Security Rewards are incremental. “For …

How trustworthy are the world’s leading websites?

The Online Trust Alliance (OTA) evaluated nearly 1,000 websites, grading them based on dozens of criteria in three categories: consumer protection, privacy and security.Their …

90% of companies benefit from Big Data

Enterprise Big Data strategies are delivering key benefits to organizations despite noted challenges in implementation, according to CA Technologies.Nine in 10 organizations …

LastPass breached, hashed master passwords compromised

LastPass, the company behind the popular password management service of the same name, has announced on Monday that they have suffered a breach, and has urged users to verify …

Trojan uses steganography to hide itself in image files

“The Dell SecureWorks CTU research team has recently analyzed a piece of malware that uses digital steganography to hide part of its malicious code. Stegoloader, as they …

Stolen Foxconn certs used to sign malware used in Kaspersky Lab attack

“After last week’s revelation that their corporate network has been hit by APT actors wielding a newer version of the infamous, Stuxnet-related Duqu attack …

Emojis instead of PIN codes as an alternative for forgetful users

For years now companies have been trying to come up with alternatives to passwords and passcodes that will be easier to remember (for users) and more difficult to guess or …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools