Explosive growth of advanced attacks and malicious traffic
The Cisco 2014 Annual Security Report, released today, reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks …
Quantum physics could make secure, single-use computer memories possible
Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer …
Starbucks iOS app stores passwords in clear text
A security researcher has discovered that Starbuck’s iOS mobile application stores users’ usernames, email address and passwords in clear text, and has tried to …
Blackphone to put privacy and control first
Silent Circle and Geeksphone announced Blackphone, a smartphone placing privacy and control directly in the hands of its users. Blackphone, powered by a security-oriented …
Scammers bypass protection mechanism, offer trojanized Minecraft Android app
Russian Android users who are looking to download the popular Minecraft game app from third-party app markets should be very careful, F-Secure researchers told PC Magazine, as …
Amazon and GoDaddy are the biggest malware hosters
The United States is the leading malware hosting nation, with 44 percent of all malware hosted domestically, according to Solutionary. The U.S. hosts approximately 5 times …
User financial info compromised in US Fund for Unicef breach
The US Fund for Unicef, a non-profit NGO headquartered in New York, has notified the Office of the New Hampshire Attorney General that it had suffered a breach in November …
US Federal Court deals a blow to net neutrality
With a verdict of 3-to-0, judges of the US Court of Appeals for the District of Columbia Circuit have decided to strike down the Federal Communications Commission’s Open …
Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
When can you trust web services to handle your data?
A new report by the EU’s cyber security agency ENISA analyses the conditions under which online security and privacy seals help users to evaluate the trustworthiness of …
Mobile applications being used for DDoS attacks
Prolexic Technologies reported that mobile applications are being used in DDoS attacks against enterprise customers. “The prevalence of mobile devices and the widespread …
Light Patch Tuesday delivers four bulletins
With only four bulletins, this month’s release is the lightest in recent memory. Markedly missing are any bulletins for Internet Explorer and not a single bulletin is …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground