Please turn on your JavaScript for this page to function normally.
iOS spyware used by Pawn Storm cyber spies

Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on …

Canarywatch: Keeping track of warrant canaries

In the post-Snowden world, the term “warrant canary” – indicating a method used by some communications service providers to let their users know that they …

Critical IE 11 bug can be used for effective phishing attacks

A hacker has discovered a universal Cross Site Scripting (XSS) flaw that affects Internet Explorer 11 on Windows 7 and 8.1, and which could allow attackers to execute …

Massive malvertising campaign leads to latest Flash Player zero-day exploit

It has been a tough beginning of the year for Adobe and a dangerous one for Adobe Flash Player users. The recently discovered zero-day vulnerability (CVE-2015-0313) affecting …

The real challenge of the Internet of Things

More than 40 percent of organizations expect the Internet of Things (IoT) to transform their business or offer significant new revenue or cost-savings opportunities in the …

RSA Conference 2015
RSA Conference 2015: Challenging today’s security thinking

RSA Conference, the premiere series of global events, will once again set the stage for the world to talk – and challenge – information security trends for 2015, …

Multi-factor authentication market will be worth US$1.6 billion by the end of 2015

ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …

Fake Facebook Account Suspended emails lead to Trojans, ransomware

Fake Facebook account suspension emails are doing rounds of inboxes around the world, trying to convince the recipients that their account has been temporarily disabled due to …

APT players lack deep skills of exploitation, fail at QA

Advanced Persistent Threat (APT) actors are generally considered to be among the most sophisticated cyber exploiters out there. But is this perception correct? Gabor …

Beware of emails pushing Google Chrome updates!

Google Chrome users are being actively targeted with a spam email campaign impersonating the Internet giant, urging them to download a newer version of the popular browser …

How to protect your identity this tax season

The majority of taxpayers will prioritize protecting their personal information this tax season, yet some safeguards go underused, according to Experian. Taxpayers are filing …

League of Legends exploit allows attackers to access gamers’ accounts

A string of hacks has revealed the existence of an exploit targeting League of Legends players, which allows the attackers to open up the game’s store from a web browser …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools