Gamers hit with trojanized versions of official League of Legends releases
Computer security experts often advise to users to download games, apps, documents, software and software updates directly from the original source (the manufacturer) or from …
Cybersecurity readiness: Widening gulf between perception and reality
Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …
SQL injection vulnerabilities surge to highest levels in three years
UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …
Biometric authentication app downloads to reach 770 million by 2019
More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …
North Korean networks compromised by NSA for a while now
A report based on documents from Edward Snowden’s NSA trove and published by Der Spiegel on Saturday described the extensive cyber spying and sabotaging capabilities of …
2+ million US cars can be hacked remotely, researcher claims
Security researcher Corey Thuen has made a surprising discovery when he reverse-engineered the firmware of the Snapshot tracking dongles that US-based Progressive Insurance …
Lizard Squad’s DDoS website hacked, unencrypted customer database stolen
The hacker group that calls itself the “Lizard Squad” has received another serious blow: LizardStresser(dot)su, the website where customers go to rent their DDoS …
Guide on actionable information for security incident response
ENISA publishes a good practice guide on Actionable Information for Security Incident Response, aiming to provide a picture of the challenges national CERTs and other security …
The rise of mercenary hacker crews offering Espionage-as-a-Service
Although the Sony attack was loud, damaging and hugely embarrassing to the company, the bigger threat is from mercenary hacker crews who steal billions of dollars of valuable …
The cost of malware containment
Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …
Week in review: Google discloses Windows flaw, French sites under attack, Android users in danger
Here’s an overview of some of last week’s most interesting news and articles: LizardSquad’s DDoS service is powered by hacked home routers The preponderance …
UK PM Cameron demonizes encryption, US report says it’s vital
When British Prime Minister David Cameron announced on Tuesday his plan to introduce new surveillance powers in the UK by forcing businesses to plant backdoors in their …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)