Malware attacks via malicious iPhone chargers
Do you ever think twice about using someone else’s charger for recharging your iPhone? Well, you will now, as three Georgia Tech researchers have managed to install a …
NSS Labs unveils Threat Modeling and Threat Forecasting
NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …
Universities are putting private financial data at risk
HALOCK found that over 50% of the colleges and universities investigated allow for the transmission of sensitive information over unencrypted (and therefore unprotected) email …
Automated remediation for APTs and 0-days
ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …
HackShield bags prevent physical and digital intrusion
Das Keyboard launched highly secure, radio frequency blocking bags. Known as HackShield bags, the company’s one-of-a-kind backpack and messenger bags empower …
Accuvant launches Threat Intelligence Briefing service
Accuvant announced at Black Hat USA 2013 the availability of its new Threat Intelligence Briefing (TIB) service. Delivered by Accuvant LABS research experts, the service gives …
McAfee Mobile Security offers enhanced privacy protection
McAfee announced an updated version of McAfee Mobile Security offering new privacy features including the Multi-user App Profile function which allows consumers to create …
New leaks say NSA can see all your online activities
If you have followed the unfolding of the NSA surveillance scandal, you have probably heard the mantra “It’s only metadata!” repeated many times by US …
Canonical reveals details of Ubuntu Forums hack
Canonical has published a postmortem on the recent Ubuntu Forums hack and has shared a blow-by-blow account on how the attack was carried out. At 16:58 UTC on 14 July 2013, …
Chrome, Firefox users targeted with account-hijacking plugins
Hijacked social networking accounts can be monetized in a number of ways, so cyber crooks are always thinking up new ways of doing so, preferably without the user noticing. …
How to spot and avoid SMS scams
2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …
72k people affected by University of Delaware hack
University of Delaware is the latest of the high-learning institutions in the US to have been hit with a cyber attack that resulted in a data breach. According to a …
Featured news
Resources
Don't miss
- The breaches everyone gets hit by (and how to stop them)
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about