Following the news that a smartphone app flaw has left Tesla Vehicles vulnerable to being tracked, located, unlocked and stolen, John Smith,…
Browsing: Malware and Vulnerabilities
Security researchers at Proofpoint have uncovered cybercrooks advertising and distributing phishing kits, that come with how-to videos and links to additional information, to…
Last year, more than 40 million retail records were lost or stolen. And the recent Beyond the Phish Report revealed users in…
Following the news that spammers are using Facebook instant messaging to spread Locky ransomware, Dr Malcolm Murphy, Technology Director, Western…
Endpoint threat detection and response capabilities are now an essential component of any enterprise security solution. The tipping point that…
Almost three million Android phones are vulnerable to code-execution attacks that remotely seize full control of the devices, researchers said.…
The number of financial phishing attacks is expected to rise during the Holiday season, which starts unofficially on so-called Black Friday,…
Qualcomm has recently announced its new Vulnerability Rewards Program, where it is offering £12,000 ($15,000) to anyone able to spot bugs…
Following the news that there have been reports of a new Facebook scam detected by security researchers over the weekend,…
John Christly, CISO, Netsurion, a provider of remotely-managed security services for multi-location businesses and subsidiary EventTracker, a security information and event management…