Apple patches Safari arbitrary code execution vulnerabilities
Apple released new versions of their Safari browser – 6.1.6 and 7.0.6 – in which they fixed multiple memory corruption problems in Webkit. Out of the seven …
ZeroLocker ransomware “helps” you get your files back
In early June, the FBI has lead a rather successful multi-national effort to disrupt the GameOver Zeus botnet which was also responsible for delivering Cryptolocker. …
Beware of fake “Gmail suspicious login” warnings
Malicious emails impersonating Gmail Account Services have been spotted hitting inboxes around the world, falsely claiming that the users’ Gmail account has been logged …
Google starts warning users about deceptive downloads
Google has announced a welcome change to its Safe Browsing service: starting next week, Google Chrome will also warn users about attempts to make them download software that …
Infographic: Honeypot cloud security data
New infographic data on hackers reveals that Russia stealing passwords is the least of our cyber worries. Recent data reveals that China and India are attacking U.S. servers …
US defense contractors still waiting for breach notification rules
US Department of Defense contractors will have to wait until September 24 to see what specific rules they will be required to follow when it comes to the reporting of computer …
SynoLocker gang planning to move on?
The crooks behind SynoLocker have made some changes to the website sporting the payment instructions. They are trying to spur more victims to pay up by saying that the website …
86% of hackers don’t worry about repercussions
Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face …
Fake Tor Project website delivers malware instead of anonymity
A computer science student has discovered an almost perfect copy of The Tor Project’s website, offering malware for download instead of the Tor Browser Bundle and …
Disqus WordPress plugin vulnerabilities
During a penetration testing for a client, Australian based independent security consultant Nik Cubrilovic, discovered a couple of security issues within the very popular …
IT has no choice but to embrace BYOD
Bring-Your-Own-Device (BYOD) and Bring-Your-Own-App (BYOA) trends started as a clandestine effort by employees to work more efficiently and grew rapidly. Since they …
Encore Networks launches ultra-low cost wireless VPN router
Encore Networks launched the EN-2000, an ultra-low cost wireless VPN router designed for high-availability M2M applications in fixed or portable locations supporting video …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE