Andy Green of Varonis shares his thoughts on the latest privacy showdown coming from the EU
While you are at the office it is probably easy to share the files that you work on with your fellow employees.
An email address that’s used for online banking and business purposes can be highly valuable for cybercriminals.
A proof-of-concept exploit for the “master key” vulnerability in Android has already been made public, so it could be only a matter of time until we see some Trojanized apps that leverage the flaw.
I’ve been writing this story forever it seems, trying to arrive at a reasonable version of the truth. I’ve been sworn to secrecy, and have had so many off-the-record conversations.
“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back.
After Liberty Reserve’s shutdown, small or big–time cybercriminals had to scurry for an alternative currency.
When Apple booted discovery app AppGratis from its App Store in April, it was a sharp reminder to iOS developers: don’t mess with Apple’s rankings or suffer the consequences.
Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.
Tumblr’s iOS app fails to log users in through a secure (SSL) server, it has emerged.