iOS spyware used by Pawn Storm cyber spies
Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on …
Canarywatch: Keeping track of warrant canaries
In the post-Snowden world, the term “warrant canary” – indicating a method used by some communications service providers to let their users know that they …
Critical IE 11 bug can be used for effective phishing attacks
A hacker has discovered a universal Cross Site Scripting (XSS) flaw that affects Internet Explorer 11 on Windows 7 and 8.1, and which could allow attackers to execute …
Massive malvertising campaign leads to latest Flash Player zero-day exploit
It has been a tough beginning of the year for Adobe and a dangerous one for Adobe Flash Player users. The recently discovered zero-day vulnerability (CVE-2015-0313) affecting …
The real challenge of the Internet of Things
More than 40 percent of organizations expect the Internet of Things (IoT) to transform their business or offer significant new revenue or cost-savings opportunities in the …

RSA Conference 2015: Challenging today’s security thinking
RSA Conference, the premiere series of global events, will once again set the stage for the world to talk – and challenge – information security trends for 2015, …
Multi-factor authentication market will be worth US$1.6 billion by the end of 2015
ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …
Fake Facebook Account Suspended emails lead to Trojans, ransomware
Fake Facebook account suspension emails are doing rounds of inboxes around the world, trying to convince the recipients that their account has been temporarily disabled due to …
APT players lack deep skills of exploitation, fail at QA
Advanced Persistent Threat (APT) actors are generally considered to be among the most sophisticated cyber exploiters out there. But is this perception correct? Gabor …
Beware of emails pushing Google Chrome updates!
Google Chrome users are being actively targeted with a spam email campaign impersonating the Internet giant, urging them to download a newer version of the popular browser …
How to protect your identity this tax season
The majority of taxpayers will prioritize protecting their personal information this tax season, yet some safeguards go underused, according to Experian. Taxpayers are filing …
League of Legends exploit allows attackers to access gamers’ accounts
A string of hacks has revealed the existence of an exploit targeting League of Legends players, which allows the attackers to open up the game’s store from a web browser …
Featured news
Resources
Don't miss
- Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?