Conficker paves the way for other malware
The recently released 12th volume of the Microsoft Security Intelligence Report has shown us that the Conficker worm is still alive and kicking, as it can be found on more …
Columbia University notifies employees of breach
Personal and financial information of 3,000 current and former employees of Columbia University and 500 other individuals have been available online from January 2010 to March …
Trojanized Grand Theft Audio for Android spotted
A Trojan masquerading as “Grand Theft Auto 10th Anniversary Edition” for Android has lately been spotted being offered on third-party Russian websites. More …
Popular Android apps leak private information
AhnLab identified many popular Android apps are asking for excessive permissions to access to the user data. AhnLab analyzed 178 best rated android apps using AhnLab Mobile …
Mobile vulnerabilities increased by 93%
A new Symantec report shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In …
Gamex Trojan threatens Android users
A new Android Trojan that first paves the way for the download of other apps and them effects it has been spotted lurking on third-party websites, camouflaged as legitimate …
Phishing email targets Santander clients
Customers of Santander, one of the largest banking groups in the world, are currently being targeted with a phishing email masquerading as a bogus notification of a scheduled …
Mobile security and identity management in the cloud
Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud …
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Programming iOS 5, 2nd Edition
Get a solid grounding in the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition of Programming iOS …
Week in review: Hotmail 0-day bug, CISPA, and securing embedded devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles: SpyEye botnet for sale at bottom price A drop in the price asked for the …
Mobile malware increasingly delivered via social networks
The growing use of mobile devices to connect with social networks is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices …
Featured news
Resources
Don't miss
- The breaches everyone gets hit by (and how to stop them)
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about