Latest News

Apple Fixes Critical Triple-handshake Flaw Apple Fixes Critical Triple-handshake Flaw

Apple has fixed a critical “triple-handshake” crypto vulnerability with a round of OS X and iOS updates that would allow an attacker with a privileged network position to capture data or change the operations performed in sessions protected by SSL.
23 April 2014

Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats

Mobile banking trojans! Bitcoin wallet attacks! Cyber-espionage threats! It turns out that these three cyber-baddies are developing their attack trajectories exactly as predicted for 2014.
23 April 2014

Millions of Android App Downloads Are Vulnerable to Heartbleed Bug Millions of Android App Downloads Are Vulnerable to Heartbleed Bug

The Heartbleed vulnerability continues to sap the life force from various sectors, and it looks like the mobile applications space is not immune. New analysis has revealed that approximately 150 million downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed, a larger number than originally expected.
23 April 2014

Samsung Galaxy S5 Fingerprint Hack Threatens Mobile Money

The Samsung Galaxy S5 has been on the market for only a matter of days, with its highly anticipated fingerprint scanner that will work with PayPal for mobile purchases. But there’s just one problem: German researchers have managed to fool the scanner with a latex fingerprint spoof.
23 April 2014

Google Issues Unprecedented Refund and Apology for Scam Virus App Google Issues Unprecedented Refund and Apology for Scam Virus App

Google is refunding victims of a bogus Android app that called itself “Virus Shield” – despite offering zero anti-virus capabilities.
22 April 2014

Evolving DDoS Tactics Hijack Internet and Cause Attack Surge Evolving DDoS Tactics Hijack Internet and Cause Attack Surge

Purveyors of distributed denial of service (DDoS) attacks are chewing up more bandwidth than ever before, and, according to Akamai Technologies’ Prolexic Q1 2014 Global DDoS Attack Report, are looking to turn the internet into one on-demand botnet thanks to evolving techniques that can deliver a bigger punch with fewer resources.
22 April 2014

Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5 Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5

Samsung and PayPal have announced that they will be using the S3 Authentication Suite from Nok Nok Labs to leverage the emerging Fast IDentity Online (FIDO) standards for mobile payments.
22 April 2014

DBIR: POS Attacks Wane, Cyber-espionage is Up DBIR: POS Attacks Wane, Cyber-espionage is Up

In the latest Verizon Data Breach Investigations report (DBIR), Verizon researchers noted that 92% of the 100,000 security incidents analyzed over the past 10 years can be traced to nine basic attack patterns that vary from industry to industry.
22 April 2014

Wick Hill Helps Industry Pros Learn More about the Latest IT Security Issues Wick Hill Helps Industry Pros Learn More about the Latest IT Security Issues

What are the important issues in IT security today? What are the solutions that work? You can get the opinions of some of the world’s leading IT security companies on these key points in the second issue of the Wick Hill Guardian, a thought leadership supplement, which is bound into the Q2 issue of Infosecurity magazine.
22 April 2014

Total Defense Divests Consumer Portfolio, Renames as iSheriff Total Defense Divests Consumer Portfolio, Renames as iSheriff

Total Defense has reached an agreement to divest its consumer product line, which will retain the Total Defense brand. The remaining corporate-focused company has, in tandem changed its name to, iSheriff. The newly branded company will exclusively focus on cloud-based, security-as-a-service solutions for the small and medium-sized enterprise market and managed service providers.
22 April 2014

Showing 1 - 10 of 9,575 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×