Please turn on your JavaScript for this page to function normally.
How a fake antivirus attack works

Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …

Dell releases secure, managed, ultra-mobile cloud access device

Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …

Hackers breach Bell Canada, leak customer info and passwords

The hacker group NullCrew has managed to access servers belonging to Bell Canada – or a third-party supplier, as Bell claims – and steal and ultimately leak …

Week in review: Feds clone TorMail server, first Android bootkit, SpyEye creator pleads guilty

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Which e-commerce sites do more to protect your password? A …

PoC mobile malware records swipes on touch screen smartphones

A security researcher has developed proof-of-concept malware capable of capturing screenshots and finger swipes on mobile devices, and is set to demonstrate his creation at …

Canadian spy agency used free airport WiFi to track travelers

A new report based on documents provided by NSA whistleblower Edward Snowden will make Canadians question whether the country’s electronic spy agency does, as it claims, …

Reactions to the Yahoo Mail hack

Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …

Researchers uncover months-old POS malware botnet

With the Target and Neiman Marcus breach being all over the news in the last few weeks, the topic of malware that collects card data directly from Point-of-Sale devices has …

Yahoo Mail accounts compromised in coordinated attack

Unknown attackers have attempted to access a number of Yahoo Mail accounts, the company warned on Thursday, and urged users to change their passwords even if they …

GitHub sets up bug bounty program

GitHub is the latest service to announce that they have started a security bug bounty program. “The idea is simple: hackers and security researchers find and report …

Global view of attack traffic and security

Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents …

10,000+ UK systems affected by ICEPOL Trojan ransomware

At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools