Security pros don’t know the number of cloud apps in their networks
In what could be called a tale of perception versus reality, the Cloud Security Alliance (CSA) released the results of a new survey that found a significant difference between …
Apple drops the “warrant canary” from transparency report
In the wake of the change of Apple’s Privacy Policy, and the encryption technology used in iOS 8 that makes it “not technically feasible” for Apple to …
Simply Secure aims to make security technology usable
Just two days after they joined a collaboration that will focus on making open source “easier for everyone,” Google and Dropbox have announced that they will be …
Home Depot completes malware elimination in all U.S. stores
Home Depot confirmed that the malware used in its recent breach has been eliminated from its U.S. and Canadian networks. They completed a major payment security project that …
With iOS 8, Apple won’t be able to unlock phones for the police
With the release of iOS 8, Apple has also updated its Privacy Policy. “The changes were made predominantly to cover new features in iOS 8, or to provide additional …
iOS 8 fixes bucketload of severe security bugs
Apple has released the latest version of its mobile OS on Wednesday, and in it has fixed over 50 vulnerabilities, many of which are very serious: Two vulnerabilities allowed a …
Malicious eBay listings redirect users to phishing site
An IT worker from Scotland who is also an “eBay PowerSeller” has discovered an eBay listing for an iPhone that was rigged to redirect potential buyers to a spoofed …
Free tool simplifies SHA-2 migration for system administrators
DigiCert released a free tool which helps system administrators analyze their use of SHA-1 hashing algorithms across all domains and subdomains and map out a path for SHA-2 …
Hackers penetrated systems of key defense contractors
Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, …
Critical Android Browser bug threatens users’ privacy
Earlier this month, security researcher Rafay Baloch has released a proof-of-concept exploit that takes advantage of a vulnerability in an Android Browser’s security …
Tinba Trojan targets major US banks
Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back. After initially being made to target users of a small …
Apple adds two-step verification for iCloud
Apple has announced that the two-step verification option for iCloud accounts now also extends to iCloud backups, preventing attackers who know the target’s password …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous