Millions of iOS users endangered by Trojanized apps from the App Store
“Unknown malware pushers have managed to trick Apple into offering for download from the company’s official App Store a considerable number of malicious apps …
D-Link accidentally leaks code-signing certs in its firmware
Malware peddlers don’t always have to steal or buy (from sellers on underground forums) legitimate and valid code-signing certificates to sign their malware with – …
Critical Bugzilla flaw allows access to unpatched vulnerability information
Mozilla has patched a critical vulnerability (CVE-2015-4499) in its popular open source bug-tracking Bugzilla software – a vulnerability that can be exploited by …
Information security: A key issue in the 2016 U.S. presidential campaign?
As the number and scale of data breaches continue to grow, cybersecurity issues are becoming part of our national discourse. The topic is already a key issue for the 2016 …
State-sponsored cyberattacks linked to Russian intelligence gathering
F-Secure Labs linked a number of state-sponsored cyberattacks to a hacking group engaged in Russian intelligence gathering. Specific targets of the attacks include the former …
Malicious SYNful Cisco router implant found on more devices around the globe
“After FireEye researchers published on Tuesday their discovery of 14 Cisco routers in India, Mexico, Philippines and Ukraine that have been implanted with a modified, …
Top cloud security issue? Lack of visibility
Lack of visibility into cloud deployments and associated provider security practices and controls is a source of major dissatisfaction amongst IT professionals, according to …
iOS 9 partially fixes critical, easily exploitable AirDrop bug
Apple has released iOS 9. Along with many new and improved security and privacy features, fixes for a bucketload of security vulnerabilities have been included in this latest …
Behind the scenes at BruCON, a European hacker conference
Setting up a local conference seems to be a popular way for infosec pros that haven’t got the time or means to travel to bring the people they want to meet and the …
Big Data investments on the rise
Investment in big data continues to increase in 2015, but not as rapidly as in previous years. More than three-quarters of companies are investing or planning to invest in big …
New POS Trojan created by mixing code from older malware
“A newly discovered POS Trojan is a perfect example of how easy it is for malware makers to come up with new malware – they can simply recycle code used in older …
80% increase of malware on Windows devices
“Alcatel-Lucent estimates that 80 percent of malware infections detected on mobile networks during the first half of 2015 have been traced to Windows-based computers. …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous