Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free …
How does a rogue ad network function?
It’s a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious …
Germany cancels Verizon’s government contract due to spying fears
Verizon will no longer provide internet services to a number of German government departments, as their contract has been cancelled as part of a restructuration of the federal …
The unlocked backdoor to healthcare data
The majority of healthcare vendors lack minimum security, which is illuminated by the fact that more than 58% scoring in the “D” grade range for their culture of …
How old are today’s networks?
The percentage of aging and obsolete devices in today’s corporate networks around the globe is at its highest in six years, signaling that the global financial crisis of …
PayPal 2FA flow partially mitigated, accounts are safe
In the wake of the revelation of a flaw that allows attackers to bypass PayPal’s two-factor authentication feature, the e-payment giant has made it temporarily …
A look at Interflow, Microsoft’s threat information exchange platform
In the last few years, there has been one constant call from almost all participants in the information security community: the call for cooperation. But that is easier said …
Critical Android code-execution flaw affects all but the latest version
IBM researchers have discovered a critical security vulnerability in Android 4.3 (Jelly Bean) and below which could allow attackers to exfiltrate sensitive information – …
What’s next: Advanced Evasion Techniques
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. …
Cops must get a warrant before looking through cellphone content
The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …
Data breaches in 2013 exposed 14% of all debit cards
Financial institutions weathered the Target data breach and are looking for solutions to enhance security, with many issuers now planning to implement EMV debit, according to …
Invasive Selfmite SMS worm uncovered
AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)