Samsung Galaxy devices’ lock screen easily bypassed
This week revealed not one, but two security vulnerabilities that allow anyone to bypass the lock screen on a variety of Samsung Android smatphones. On Monday UK blogger …
Google reports on non-court ordered FBI data requests
With every new Transparency Report that Google releases biannually since 2009, new information about data requests from government agencies are included. This last report, …
Malicious Java applet uses stolen certificate to run automatically
A signed but malicious applet that will apparently fool even the latest Java 6 update has been discovered on a German online dictionary website infected by the g01pack exploit …
99 percent of web apps vulnerable to attack
A new Cenzic report demonstrates that the overwhelming presence of web application vulnerabilities remains a constant problem, with an astounding 99 percent of applications …
Identity theft on the rise this tax season
The threat of identity theft this tax season leaves consumers with more to worry about than whether or not a tax return is in the mail. A thief may use sensitive information, …
Bogus Delta receipt confirmation leads to malware
Once again, Delta Air Lines customers are being targeted with spoofed emails supposedly carrying their eTicket, and are urged to download and open the attached PDF file …
Static analysis tool for examining binaries
GrammaTech announced a static-analysis tool for analyzing binary libraries and executables. CodeSonar for Binaries enables users to examine software for security …
Dell SecureWorks expands incident response services
Dell SecureWorks is expanding its incident response (IR) services to counter the growing severity and frequency of breaches. Many organizations aren’t equipped …
Enterprise security for businesses addressing privacy obstacles
Protegrity announced deeper enterprise security for global businesses addressing privacy obstacles such as cross-border data transfer and industry specific regulatory …
Longline phishing attacks rely on mass customization
Proofpoint released a wide-ranging study that identified a new class of sophisticated and effective, large-scale phishing attack dubbed “longlining”. Longlining, …
New exploit kit concentrates on Java flaws
Webroot’s Dancho Danchev is known for combing through the wilds of the Internet for places where cyber criminals congregate and reporting back with interesting news …
Older MiniDuke strain found, raises questions about its origins
A version of MiniDuke – the cyberspy malware aimed at governments and agencies in Europe and elsewhere – has been operating for at least 21 months, internet …
Featured news
Resources
Don't miss
- Fighting AI with AI: How Darwinium is reshaping fraud defense
- Beyond Passwords: A Guide to Advanced Enterprise Security Protection
- Why behavioral intelligence is becoming the bank fraud team’s best friend
- Ransomware will thrive until we change our strategy
- The final frontier of cybersecurity is now in space