A rash of hacking attacks on U.S. companies over the past two years has prompted insurers to massively increase cyber…
Browsing: Malware and Vulnerabilities
Newly discovered Android malware dubbed Kemogeis capable of flooding infected devices with unwanted advertisements. The malware is seeded in what…
A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two…
Many organizations are turning to a new mechanism to deliver customer care: social media. A preferred communication channel for many…
Threat modeling is vital to any security practice. For example, we can understand the OWASP top 10 vulnerabilities, but we…
When you give your personal information to a financial institution, government, or insurance company, you have a certain level of…
More than six months since The Register reported that Virgin Media had failed to move away from weak encryption software…
YISPECTER malware is the first to attack non-jailbroken Apple iOS devices by abusing private apis. So far, the malware primarily…
Most people are familiar with the notion of an adblocker. It’s pretty much what it says on the label: a…
Data dissemination and file collaboration are natural parts of most business and operational workflows; thus, security must be an integral…