Malware peddlers prefer deceptive tactics to exploits
Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …
The prime target for malicious emails
In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …
Orange hacked again, 1.3M users affected
French telecom provider Orange has suffered a second data breach in less that four months, and this time the intruders made off with personal information of some 1.3 million …
Growing dynamic in politically-motivated hacktivism
While financial cybercrime becomes ever more entrenched through a consolidating demand and supply chain, the hacktivist landscape is more turbulent, vacillating constantly in …
Industries on the cyber war front line
ThreatTrack Security published a study that looks at the security vulnerabilities of two industries most often targeted by cybercrime: energy and financial services. 72% of …
Seagate Wireless Plus offers advanced cloud backup
The Seagate Wireless Plus mobile device storage now consists of a family of capacities at 500GB, 1TB and 2TB versions to suit every need along with integration with cloud …
Moves users get new privacy policy after Facebook deal
When Facebook acquired ProtoGeo Oy and its popular fitness app Moves, it was announced that “the Moves experience will continue to operate as a standalone app, and there …
4chan launches bug bounty program
In the wake of the recent data breach that spelled the end of art products Canvas and DrawQuest, 4chan founder and owner Chris “moot” Poole has announced that they …
Beware of Google+ “Fraudulent Verification Survey” phishing scam
Phishers are again after Google account login details – this time they are trying pass themselves off as the nonexistent “Google+ All Domain Mail Team” and …
Attackers rope DVRs in bitcoin-mining botnet in record time
How long does it take for one out of the box digital video recorder to be compromised with malware once the device has been connected to the Internet? The unfortunate answer …
25% of breaches go undetected for more than a day
Recent data breaches have had little impact on the security controls of retail and financial organizations, according to Tripwire. Of the 102 financial organizations and 151 …
It’s World Password Day: Change your passwords
Today (May 7) is World Password Day – a day dedicated to promoting the use of strong passwords and the creation of good habits when it comes to choosing passwords. …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)