Scam emails pleading for donations for Phillipines doing rounds
In a move that should surprise no-one, cyber scammers have started taking advantage of the disastrous situation in the Philippines in the wake of Typhoon Haiyan. The scammy …
Adallom unveils SaaS enterprise security solution
Adallom announced its complete security solution for SaaS applications, which delivers cloud-based security that audits all SaaS activities and provides real-time mitigation …
The operations of a cyber arms dealer
FireEye researchers have linked eleven distinct APT cyber espionage campaigns previously believed to be unrelated, leading them to believe that there is a shared operation …
Apple-related phishing and online banking malware increase
As the holiday season approaches, Trend Micro is raising concern about the ongoing proliferation of Apple iOS phishing sites, as well as a sizable uptick in online banking …
Top 12 scams of the holiday season
McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …
GCHQ hacks GRX providers to mount MitM attacks on smartphone users
A new report by German Der Spiegel has revealed that the Government Communications Headquarters (GCHQ), the UK equivalent of the US NSA, has compromised a number of Global …
New IE 0-day actively exploited by Chinese attackers
After having discovered a new IE zero-day exploit being actively used in the wild, FireEye researchers have revealed that the watering hole attack is more than likely mounted …
Trustwave acquires Application Security, Inc.
Trustwave announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen …
Snowden social-engineered co-workers to share their passwords
The revelations stemming from the documents exfiltrated by former NSA contractor Edward Snowden have changed the way we look at many things, but the details that have been …
Over 30 billion devices will be connected in 2020
With the digital world upon us, digitalization will significantly change the technology market through the Internet of Things, according to Gartner. While IT spending in …
Cryptolocker surge directly tied with Blackhole downfall
The recent emergence of Cryptolocker as one of the most widespread, visible and deadly threats is directly tied to the arrest of “Paunch”, the creator of the …
The complexity of Android malware is increasing
259 new mobile threat families and variants of existing families were discovered by F-Secure Labs in the third quarter of 2013, according to the a new mobile threat report for …