Geopolitical tension has a long-tail effect in cyberspace. In the aftermath of major political or military incidents, beneath the public…
Browsing: Malware and Vulnerabilities
Love is purportedly in the air again, but is it being harnessed and channelled in the right direction? This Valentine’s…
What makes for a successful cyberattack? Technology is one part of the picture, clearly. Malicious cybercriminals make use of a…
Today the Ponemon Institute, in partnership with DomainTools, announced the results of its annual “Staffing the IT Security Function in…
The FBI has sent a security alert to the US private sector highlighting a hacking campaign targeting supply chain software…
GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam…
The personal information of over six million citizens was leaked after Benjamin Netanyahu’s Likud party uploaded the full register of Israeli…
A new threat report from cybersecurity company Dragos details the characteristics of a form of ransomware known as Ekans. This ransomware –…
As reported by Scamicide, there is a new phishing scam riding on the back of Google Docs attachments. A phishing email…
Attackers are exploiting the hype surrounding this year’s Oscar Best Picture nominated movies to infect fans with malware and to…