Following Brian Krebs’ report on a data breach at Oracle’s MICROS Point-of-Sale Division, Thomas Pore, Director of IT at Plixer commented below how…
Browsing: Malware and Vulnerabilities
Following Symantec’s discovery of Strider, a previously unknown cyberesionage group, security experts commented below. Leo Taddeo, Chief Security Officer at Cryptzone:…
Twitter scammers have a new weapon with the release of an effective spear phishing tool that lands a victim almost…
Following the investigation into the attempted hack into the Garda Síochána (Irish Police) computer system, Jonathan reminds organisations of the…
Four newly discovered Android vulnerabilities can give attackers complete control of devices and access to sensitive data on them Check…
Convinced by the prospect of cost savings, global email access and a round-the-clock workforce, a growing number of organisations have…
Tripwire researchers have found that organizations using Ruckus internet routers may be at risk of compromise, particularly when the access points are…
There’s a sucker born every minute. And for each sucker there are hundreds of scammers waiting to take advantage of…
In my work as a penetration tester for SureCloud, I’m often asked to look at unusual, out-of-the-ordinary vulnerabilities. This was…
Following the news that the two researchers who hacked the Jeep Cherokee car last year during BlackHat have now hacked…