Malware targets jailbroken iOS devices, hijacks ad revenue
AdThief (or Spad) is the name of a recently discovered iOS malware that has managed to infect some 75,000 jailbroken iOS devices and steal revenue from around 22 million ads …
Virtual machines no longer keeping malware at bay
It used to be that running and working on a virtual machine could almost guarantee you complete avoidance of malware infections, but that time has passed, says Symantec …
15 new bugs exploited at DEF CON router hacking contest
Security researchers taking part of the SOHOpelessly Broken hacking competition at this year’s edition of DEF CON have demonstrated 15 flaws affecting a number of small …
Android backdoor lurking inside legitimate apps
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play …
A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress
In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max …
Microsoft fixes 37 vulnerabilities
Microsoft clearly wants everyone to shake off the dog days of summer and pay attention to patching. This month’s advance notice contains nine advisories spanning a range …
How security practitioners deal with incident response
A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response, according to a new SANS survey. …
GFI WebMonitor 2015 Beta 1 released
Beta 1 of a totally revamped GFI WebMonitor is now available for preview. GFI WebMonitor 2015 is a new, powerful version that really gives sysadmins the tools to manage …
iPhones are immune to FinSpy infections
FinSpyMobile, the mobile spying software sold by German company Gamma Group, can’t be installed on iPhones that have not been jailbroken, shows one of the documents …
Data breaches and high-risk vulnerabilities continue to dominate
Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …
Splunk App for Stream released
Splunk announced the availability of the Splunk App for Stream, which offers a new software approach for capturing real-time streaming wire data. The app is free for Splunk …
Square launches bug bounty program
Popular California-based financial services and mobile payments company Square has set up a bug bounty program on the HackerOne platform. The announcement was made at a panel …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE