Latest News

Application Security

Android Malware Repurposed to Thwart Two-factor Authentication Android Malware Repurposed to Thwart Two-factor Authentication

A malicious mobile application for Android that offers a range of espionage functions has now gone on sale in underground forums with a new trick: it’s being used by several banking trojans in an attempt to bypass the two-factor authentication method used by a range financial institutions.
17 April 2014

Oracle Fixes 104 Flaws in Massive April Patch Update Oracle Fixes 104 Flaws in Massive April Patch Update

Oracle has released its April 2014 Critical Patch Update, providing fixes for 104 vulnerabilities across a number of product lines, with several of them considered severe. Among the patches are fixes for 37 Java SE vulnerabilities.
17 April 2014

Android Flaw Allows Home Screen Icons to be Hijacked Android Flaw Allows Home Screen Icons to be Hijacked

A fresh Android vulnerability dubbed “occupy your icons” by mobile researchers has been uncovered. It allows a malicious app to replace legitimate Android home screen icons with fake ones that point to phishing apps or malware-serving websites.
14 April 2014

Open-source Bug Leaves Millions of Websites Exposed to Data Leaks Open-source Bug Leaves Millions of Websites Exposed to Data Leaks

Heartbleed, a vulnerability in the OpenSSL crypto software library, has left millions of websites potentially vulnerable to data leakage, in what some security experts are calling the most significant security problem in recent memory.
11 April 2014

Botnets Take to Mobile Dating App Tinder to Flirt and Hurt Botnets Take to Mobile Dating App Tinder to Flirt and Hurt

A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
05 April 2014

Apple Issues Safari Update with a Raft of Fixes Apple Issues Safari Update with a Raft of Fixes

Apple has fixed 25 memory corruption security flaws in the WebKit framework, with an update to its Safari web browser for Mavericks. Most of the issues could result in remote code execution.
03 April 2014

Tesla Electric Vehicle Owners Should Beware the Phish Tesla Electric Vehicle Owners Should Beware the Phish

Connected cars are continuing to wheel their way into consumer lives, with some, like Elon Musk’s Tesla line of electric vehicles, serving as prototypes for the Internet of Things (IoT)-enabled future. Sleek, sustainable and connected, the Tesla Model S is a futuristic automobile, with a robust set of communications capabilities. But because it connects with car owners and the Tesla infrastructure using a variety of TCP/IP mechanisms, one researcher is highlighting potential security issues.
01 April 2014

Angry Birds Leaks a Host of Info to Marketers Angry Birds Leaks a Host of Info to Marketers

Bad piggies may need to be toppled, but fans of the ubiquitous Angry Birds mobile app should be aware that the popular game collects and shares players’ personal information much more widely than most people realize.
28 March 2014

Analysis of 3 Billion Attacks Demonstrates Security Gap Between Attack and Defense Analysis of 3 Billion Attacks Demonstrates Security Gap Between Attack and Defense

For the first time, NTT has pooled the resources of its group companies and produced a threat report based on an analysis of 3 billion attacks. What it found is that while attackers move faster than defenders, and there are still many basic processes and procedures that companies are failing to implement.
27 March 2014

Governments to Lose $50bn to Piracy-related Malware in 2014 Governments to Lose $50bn to Piracy-related Malware in 2014

Governments could lose more than $50 billion in 2014 thanks to costs associated with malware in pirated software, according to a study by the National University of Singapore (NUS) and research firm IDC.
24 March 2014

Showing 1 - 10 of 2,395 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×