Fake Android apps bypass Google Play store security
“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …
Former journalist faces 25 years in prison for article defacement
Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …
Hackers breach firm whose tech is used in Samsung Pay
It was revealed on Wednesday by the New York Times that LoopPay, a US-based Samsung subsidiary whose technology is central to the Samsung Pay mobile payment system, has …
Pen-testing drone searches for unsecured devices
You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …
Photo: A walk through Cyber Security Europe 2015
Taking place in London this week, Cyber Security Europe 2015 features seminars and solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to …
The average cost of cybercrime escalates to $15 million per organization
A new study by the the Ponemon Institute and HP reveales a dramatic increase in the overall cost of cyber crime. The 2015 Cost of Cyber Crime Study quantifies the annual cost …
How are businesses responding to cyber risks?
Year after year, cyberattacks continue to escalate in frequency, severity and impact. However, prevention, detection methods and cybersecurity innovation are on the rise as …
The impact of digital business on information security
Changes in computing fabric, devices and services formed by digital business continue to shape risk and security landscapes, according to Gartner. By year-end 2017, more than …
Free tool to remove YiSpecter iOS malware
“Zimperium has released a tool to help iOS users that have been infected with the recently spotted YiSpecter advertising malware remove the threat from their devices. …
Huawei 3G routers rife with flaws
South Korean security researcher Pierre Kim has revealed today that fifteen Huawei 3G routers have a slew of serious vulnerabilities – RCE, XSS, CSRF, DoS, …
Wealth of personal data found on used electronics purchased online
Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and …
Amazon launches AWS web application firewall
A new option has been offered to Amazon Web Services customers who want to increase the security of their servers: AWS WAF. This web application firewall aims to stop random …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services