Security is the biggest obstacle for moving data to Office 365
CipherPoint revealed the findings of its first State of Collaboration Security Report highlighting security issues with collaboration platforms such as Microsoft SharePoint, …
NSA uses Google cookies to track and target suspects
Newly published documents from Edward Snowden’s trove show that the NSA and its British counterpart GCHQ use Google’s “preferences” cookies to follow …
RAT-wielding attacker compromises poker player’s laptop
The laptop of a high-profile Finnish poker player has been found to contain spying malware after the device was stolen from and then returned to his room in a 5-star hotel in …
Deplorable security flaws in Santander UK banking apps and site
When banks urge customers to use their mobile banking apps and sites for making online payments, users usually assume these methods are secure and do so. But Paul Moore, a …
Android malware places secret calls to premium rate numbers
A mobile malware family dubbed MouaBad by Lookout researchers has lately been plaguing Chinese users with older versions (3.1 and earlier) of Android. Variants of the malware …
Tales of passwords, cyber-criminals and daily used devices
Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …
Transforming security processes to manage cyber risks
RSA, The Security Division of EMC, released the latest SBIC report, providing guidance for how organizations can enable new competitive advantages in their business by …
Firefox 26 blocks Java plugins by default
Mozilla released Firefox 26 which includes five critical, three high, three moderate, and three low security updates. All Java plug-ins are defaulted to ‘click to …
Smarter cyber crime forces industry to change
Sophos released its latest Security Threat Report which outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their …
Positive and negative cyber threat developments in 2013
The EU’s cyber security Agency ENISA has issued its annual Threat Landscape 2013 report, where over 200 publicly available reports and articles have been analyzed. The …
Microsoft fixes 24 vulnerabilities
This Patch Tuesday features a solid 11 advisories affecting 6 different product types. All supported versions of Windows, Office, SharePoint, Exchange, Lync and a mixed bag of …
Disqus security flaw used to deanonymize online commenters
A security flaw in the API of popular blog comment hosting service Disqus can be exploited to reveal the email addresses of users, and therefore occasionally even their …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground