Cybercriminals exploit trusted app and service vulnerabilities
The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 percent of …
Card fraud impacts 1 in 4 consumers worldwide
A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. The study, …
Hackers to attack routers at DEF CON
A competition is scheduled for hackers and computer scientists from around the world to better protect consumers against widespread security vulnerabilities in wireless …
Dropbox-themed phishing is after multiple login credentials
Phishing emails purportedly leading users to a file hosted on Dropbox are targeting Yahoo!, Gmail, Hotmail, and Aol email users, warns Malwarebytes’ Jovi Umawing. …
Google forks OpenSSL: BoringSSL will be used in company products
Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google’s projects. “We have used a number of …
Key Internet of Things privacy and security issues
Independently administered throughout 11 countries, a new Fortinet survey gives a global perspective about the Internet of Things, what security and privacy issues are in …
Spammers increasingly targeting Montreal
AdaptiveMobile released data that shows a marked increase in SMS spam across Canada in the past six months. The higher volume of SMS spam comes on the eve of the July 1st …
Quarter of all UK attacks target web services and applications
A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web applications. This is …
Cisco releases source code for experimental block cipher
A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for …
Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …
Critical flaw exposes admin passwords of nearly 32,000 servers
Over 30,000 servers with Supermicro baseboard management controllers (BMCs) on their motherboards are offering up administrator passwords to anyone who knowns where to look, …
TrueCrypt developer says forking the software is impossible
Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt …
Featured news
Resources
Don't miss
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation