Latest News

Industry News

Apple Fixes Critical Triple-handshake Flaw Apple Fixes Critical Triple-handshake Flaw

Apple has fixed a critical “triple-handshake” crypto vulnerability with a round of OS X and iOS updates that would allow an attacker with a privileged network position to capture data or change the operations performed in sessions protected by SSL.
23 April 2014

Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats

Mobile banking trojans! Bitcoin wallet attacks! Cyber-espionage threats! It turns out that these three cyber-baddies are developing their attack trajectories exactly as predicted for 2014.
23 April 2014

Evolving DDoS Tactics Hijack Internet and Cause Attack Surge Evolving DDoS Tactics Hijack Internet and Cause Attack Surge

Purveyors of distributed denial of service (DDoS) attacks are chewing up more bandwidth than ever before, and, according to Akamai Technologies’ Prolexic Q1 2014 Global DDoS Attack Report, are looking to turn the internet into one on-demand botnet thanks to evolving techniques that can deliver a bigger punch with fewer resources.
22 April 2014

Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5 Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5

Samsung and PayPal have announced that they will be using the S3 Authentication Suite from Nok Nok Labs to leverage the emerging Fast IDentity Online (FIDO) standards for mobile payments.
22 April 2014

DBIR: POS Attacks Wane, Cyber-espionage is Up DBIR: POS Attacks Wane, Cyber-espionage is Up

In the latest Verizon Data Breach Investigations report (DBIR), Verizon researchers noted that 92% of the 100,000 security incidents analyzed over the past 10 years can be traced to nine basic attack patterns that vary from industry to industry.
22 April 2014

Total Defense Divests Consumer Portfolio, Renames as iSheriff Total Defense Divests Consumer Portfolio, Renames as iSheriff

Total Defense has reached an agreement to divest its consumer product line, which will retain the Total Defense brand. The remaining corporate-focused company has, in tandem changed its name to, iSheriff. The newly branded company will exclusively focus on cloud-based, security-as-a-service solutions for the small and medium-sized enterprise market and managed service providers.
22 April 2014

Japan Awaits Its First Bitcoin ATM Japan Awaits Its First Bitcoin ATM

Japan's first bitcoin ATM will soon be landing in that country, earmarked for unveiling in Suzuka City, home of Japan’s Grand Prix event. From there, it will go on to a permanent location, to be determined.
22 April 2014

Stealer Trojan Becomes Mobile Malware Leader Stealer Trojan Becomes Mobile Malware Leader

It’s no secret that mobile malware is growing exponentially, with Android bugs leading the way, but one stands out above the rest: The Trojan-SMS.AndroidOS.Stealer.a - better known as 'Stealer' - has become a leader in terms of the number of attempted infections on user devices monitored by Kaspersky Lab.
21 April 2014

CloudFlare Launches Bug-Hunting Program CloudFlare Launches Bug-Hunting Program

CloudFlare has launched a vulnerability disclosure program, facilitated by HackerOne’s bug reporting platform. The vendor is inviting the security community to report any flaws members may have discovered, track CloudFlare’s progress in addressing it, and receive confirmation when it has been fixed.
21 April 2014

GAO Takes SEC to Task Over Vulnerable Financial Systems

Although the Securities and Exchange Commission (SEC) had implemented and made progress in strengthening its information security controls in the past few months, a report from the Government Accountability Office (GAO) has detailed that serious weaknesses remain when it comes to protecting the financial footprint.
21 April 2014

Showing 1 - 10 of 1,780 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×