Microsoft offers $250,000 prize for innovative security technology
Microsoft may not believe in bug bounties, but it’s not adverse to paying for knowledge when it comes to ingenious defensive solutions. The company’s Trustworthy …
Call-recording Trojan is actually unethical app
The recently discovered Android Trojan that records actual phone conversations seems to represent a lesser danger than previously thought. For one thing, it isn’t hidden …
An epidemic of security worst practices
The majority of organizations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place, …
Unprecedented state-sponsored global cyberattack revealed
The news that at least 72 government agencies, corporations and political organizations based all over the world have been targeted (and compromised) for over five years by …
Mobile threats soared in past six months
Mobile malware has increased significantly, and Android users are two-and-a-half times as likely to encounter malware today than just six months ago, says Lookout. Based on …
First SIEM and penetration testing integration
NitroSecurity and Rapid7 announced the pairing of NitroSecurity’s NitroView with Rapid7’s Metasploit Pro 4.0 solution, in order to enable security operations …
Malware hides behind DWORD formatted IP addresses
Internet users know what a domain name is, and many of them are aware of the fact that it is a “translation” of a dotted decimal IP address. But how many of them …
Zero-day bug found in WordPress themes
A bug in a popular WordPress utility is being misused by attackers to upload and make appear on the targeted site annoying and possibly malicious content. The bug was …
Tracking anomalies from multiple sources across the organization
Zettaset unveiled its new Security Data Warehouse (SDW), which enables users to track up to petabytes of business and security data for anomalies and other potentially …
First fingerprint-enabled NFC payment transaction executed
NXP Semiconductors, AuthenTec and DeviceFidelity announced that they are jointly developing reference designs that enable highly secure mobile payments via Android-based …
The Sun readers’ personal information leaked
News International has sent out emails to thousands of its online readers warning them that their personal information has been published by a hacker that goes by the handle …
“Assume you are compromised,” say top security officers
RSA released a new report that takes an in-depth look at the seismic shift in the cyber threat landscape, as enterprises are increasingly targeted for corporate espionage and …