Are you ready for EMV?
As retailers and banks prepare for the October 1 EMV liability shift—which moves fraud liability from issuing banks to merchants —many consumers have not yet received their …
Android SMS Trojans evolve, go after bank and payment system accounts
“Once upon a time cyber crooks used SMS Trojans to earn themselves money by subscribing users to unwanted premium mobile services. Today, the situation has changed, and …
Reactions to the XcodeGhost malware infecting iOS apps
“Unknown malware pushers have managed to trick Apple into offering for download from the company’s official App Store a considerable number of malicious apps. Here …
Malware-infected game discovered on Google Play, up to 1 million users at risk
Check Point researchers found sophisticated new malware on Google Play which has infected between 200,000 and 1 million users. The malware is packaged within an Android game …
Number of XcodeGhost-infected iOS apps rises
“As the list of apps infected with the XcodeGhost malware keeps expanding, Apple, Amazon and Baidu are doing their best to purge their online properties of affected …
AVG will sell user browsing and search info to advertisers
Starting on October 15, when its new privacy policy comes into effect, Czech AV maker AVG will start selling user activity information to online advertisers.“We do not, …
26 vulnerabilities found in parental monitoring application
A new Citizen Lab report details results of two independent audits of the privacy and security of Smart Sheriff, a parental monitoring application that has been promoted by …
Symantec fires employees who issued rogue Google certificates
Symantec has fired several employees that have been involved in the issuing of rogue certificates for some Google domains.“We learned on Wednesday that a small number of …
The average budget required to recover from a security breach
The average budget required to recover from a security breach is $551,000 USD for enterprises, and $38,000 for small and medium businesses according to Kaspersky Lab.Based on …
Why improving cyber resilience is key
75 percent of U.S. organizations are not prepared to respond to cyberattacks, leaving them more vulnerable than ever against increasing intensity and volume of security …
Cyber risk still poorly communicated to C-suite executives
Cyber risk continues to be poorly communicated to C-suite executives, according to Auriga Consulting. The monopolisation of the risk management function by IT and security …
Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles:(IN)SECURE Magazine issue 47 released(IN)SECURE Magazine is a free digital …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous