Critical Git flaw allows attackers to compromise developers’ machines
A critical vulnerability affecting all versions of the official Git client and all related software that interacts with Git repositories has been found and patched, and …
Top 5 social media security predictions for 2015
Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015. Studies in the last year on …
Smart grid security certification in Europe
ENISA issues a report on smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with …
Researcher publishes JavaScript DoS tool
Trigger-happy attackers looking for additional ways to bring websites to their knees by means of a DoS attack have been given another tool that can aid in their efforts: …
Malware peddlers take advantage of Sony’s decision to pull controversial film
In the wake of Sony Pictures Entertainment’s decision to scrap the theatrical release of the controversial film “The Interview” altogether, cyber criminals …
ICANN systems breached via spear-phishing emails
As many organizations before it, the Internet Corporation for Assigned Names and Numbers (ICANN) has been compromised after some of its employees fell for cleverly constructed …
Ars Technica readers urged to change passwords in wake of hack
In case you haven’t heard already, Ars Technica got hacked over the weekend, so if you are a subscribed reader now would be a good time to change your password. …
Only 1% of consumers feel safe using mobile payments
Evaluating online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., a new survey by One Poll and Dimensional Research revealed that more than 40 percent of …
Application Threat and Usage Report 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic …
Google starts blocking badly behaving Gmail extensions
How to deal with untrustworthy third-party add-ons that could endanger your own users? Prevent them from loading – if you can. That’s what Google recently did with …
Malware peddlers turn again to malicious links
In the continuous see-sawing that spammers and malware peddlers perform between sending out emails with malicious links and those with malicious attachments, the former method …
Researchers confirm multiple Google App Engine security sandbox bypasses
Polish firm Security Explorations, which announced last week that they found over 30 serious security issues in the Java security sandbox of the Google App Engine (GAE), has …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online