A proof-of-concept exploit for the “master key” vulnerability in Android has already been made public, so it could be only a matter of time until we see some Trojanized apps that leverage the flaw.
Author: ISBuzz Team
I’ve been writing this story forever it seems, trying to arrive at a reasonable version of the truth. I’ve been sworn to secrecy, and have had so many off-the-record conversations.
“Cybersecurity” and “cyber security” are getting more and more mixed usage lately, so much that they are becoming almost as ambiguous as the term “cloud” was a few years back.
After Liberty Reserve’s shutdown, small or big–time cybercriminals had to scurry for an alternative currency.
When Apple booted discovery app AppGratis from its App Store in April, it was a sharp reminder to iOS developers: don’t mess with Apple’s rankings or suffer the consequences.
Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.
Tumblr’s iOS app fails to log users in through a secure (SSL) server, it has emerged.
On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs—not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about and exploit.
A new Red Alert Research Report from Varonis, based on survey data from 248 information security professionals, indicates that a mere 6% of companies have automated breach detection.
Sony has finally agreed to pay the £250,000 (nearly $400,000) that UK authorities handed in January following the conclusion of an investigation into the hacking of its PlayStation Network in 2011. The incident compromised millions of users’ account details.