How employees use business email
The conventional 9am-5pm working day and five-day working week is a thing of the past for the overwhelming majority of workers at SMBs, according to a new survey on …
Android malware continues to rise
The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs, January through March saw …
U.S. government tops list of malware buyers
While vocally and repeatedly tying all kinds of discovered cyber attacks to Chinese hackers, the U.S. has quietly been working on their own cyber offensive capabilities …
Malicious browser extensions are hijacking Facebook accounts
Facebook users – especially those in Brazil – are being targeted with malicious browser extensions trying to hijack Facebook profiles, warns Microsoft. So far, …
Police unable to decrypt iPhones, asks Apple to do it
Court documents from a drug trial in Kentucky have revealed that the U.S. federal Bureau of Alcohol, Tobacco, Firearms and Explosives nor any other U.S. local, state, or …
Scammers combine fake AV and bogus support calls
Scammers have found a new way of relieving unsuspecting victims of their hard earned cash: they have begun combining fake AV with fake support calls. The scam begins with …
Font apps on Google Play deliver spyware
Everybody should know by now that downloading apps from Google Play is not as safe as we all would like. Admittedly, the probability of downloading malware is much smaller …
No money mule, no problem: Recruitment website kits for sale
A valuable asset in the fraud world, money mules enable cybercriminals to cash out stolen money. After cybercriminals take over a victim’s account, they enlist the help …
Can mobile devices be more secure than PCs?
Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …
Open source NAC PacketFence 4.0 released
PacketFence is a fully supported, trusted, free and open source NAC solution. Among the features provided by PacketFence, there are: BYOD workflows Guests management Multiple …
Week in review: Malware you can “live with”, but should’t, and backdoor targeting popular web servers
Here’s an overview of some of last week’s most interesting news, videos, interviews, reviews and articles: Malware you can “live with”, but …
Academic institutions urged to improve network and DNS configurations
The Research and Education Networking Information Sharing and Analysis Center (REN-ISAC) has issued an alert to IT security staff, and network and DNS administrators urging …