The number of users attacked by ransomware targeting Android-based devices has increased four-fold in just one year, hitting at least…
Browsing: Endpoint Security
Researchers have discovered a complex phishing scheme aimed at collecting user credentials from various Bitcoin-related services which under a closer…
With new waves of ransomware attacks striking headlines everywhere, it’s truly time to take a proactive stance against malware. But,…
The Computer maker Acer’s U.S. webstore was breached for nearly a year, potentially exposing credit card data, names and mailing addresses of 34,500 customers. John Peterson,…
Delayed software updates enable cybercriminals to exploit mobile apps; Pinkslipbot Trojan returns with new capabilities NEWS HIGHLIGHTS McAfee Labs identifies…
Following the news that Flocker Android Ransomware is now infecting Smart TVs, experts from PRPL Foundation, Imperva, Proofpoint and MIRACL, commented below.…
The Definitive List of the World’s Hottest and Most Innovative Cybersecurity Companies Cybersecurity Ventures announces the Q2 2016 edition of…
Necessity is the mother of invention, and with new breaches reported on a near-daily basis, the evolutionary arms race between…
With the news of the Pavlok wristband which conditions wearers into good behaviour by using shock therapy, Liviu Itoafa, security researcher at…
All of the top 10 apps fail to use secure data storage to protect Personally Identifiable Information All of the…