51% of consumers share passwords
Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …
Coder tries shaming apps and site owners into using HTTPS
How can we force website owners and software developers to start using HTTPS? Coder Tony Webster believes shaming might be the right answer. To that point, he created a …
Reactions to the massive breach at Community Health Systems
Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …
Successful strategies to avoid frequent password changes
1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …
New ransomware emulates CryptoLocker, CryptoWall
Ransomware has proven to be such a successful money-making model, that a new variant is discovered or a new delivery campaign is spotted nearly every day. Security experts …
Infographic: Major security skills shortages
Cyber attacks are getting more advanced and hackers are getting smarter, yet businesses are facing major security skills shortages. The cost of breaches is thought to have …
Personal info of 4.5 million patients stolen in US hospital group breach
Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …
Research unveils improved method to let computers know you are human
CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the …
Gyroscopes on Android devices can be used to eavesdrop on users’ conversations
If you think that denying an app permission to use your phone’s microphone is enough to prevent it from listening in on your conversations, think again, as a group of …
Android ransomware masquerades as Symantec mobile AV
A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app. The malware sports a logo similar to that of …
ReversingLabs extracts malicious files from network traffic
ReversingLabs announced the N1000 Network File Threat Sensor appliance that employs Active Decomposition and Predictive Detection technologies to detect threats in files …
Whitepaper: Social networking and security risks
The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be …