Latest News

1 in 10 Android Apps Are Virus-Infected 1 in 10 Android Apps Are Virus-Infected

Third-party markets in Asia are the main culprits.
31 July 2014

Crippling DDoS Hits Major Aussie Broadband Provider Crippling DDoS Hits Major Aussie Broadband Provider

Cirrus Communications had half of its network taken down by attack earlier this week.
31 July 2014

Chinese Hackers Use APTs to Target Gaming Companies Chinese Hackers Use APTs to Target Gaming Companies

TG-3279 group wants to play games for free or re-use source code in competing products, says Dell
31 July 2014

Android Malware Hijacks Voice Assistant Android Malware Hijacks Voice Assistant

The bug needs no permissions to carry out its deeds.
30 July 2014

Canada Claims Chinese Cyber Attack Will Set it Back One Year Canada Claims Chinese Cyber Attack Will Set it Back One Year

Government CIO says National Research Council was hit by intrusion from ‘sophisticated’ state-sponsored actor
30 July 2014

Cloud Security Alliance Develops Assessment Spec for Third Parties Cloud Security Alliance Develops Assessment Spec for Third Parties

The STAR Attestation is aimed at CPA assessments.
30 July 2014

Android Users on High Alert After FakeID Bug Discovery Android Users on High Alert After FakeID Bug Discovery

Major vulnerability allows malware to impersonate legitimate apps.
30 July 2014

DDoS-ers Launch Attacks From Amazon EC2 DDoS-ers Launch Attacks From Amazon EC2

Cybercriminals exploit vulnerability in Elasticsearch software to infiltrate cloud instances.
30 July 2014

Comment Crew Chinese Hackers Blamed for Stealing Israeli Missile Secrets

Notorious PLA unit was after IP related to Israel’s Iron Dome missile defense system, says CyberESI.
29 July 2014

Nation-E Readies Cybersecurity Center for Critical Infrastructure Nation-E Readies Cybersecurity Center for Critical Infrastructure

The focus will be on training and disaster preparedness.
29 July 2014

Showing 1 - 10 of 9,965 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×