Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate.
Browsing: Malware and Vulnerabilities
A large number of end-user computers are mobile devices and the lion’s share of those are smartphones. APTs are increasingly targeting the mobile market.
Despite it being nearly impossible to avoid news about malware, cyber-espionage and other cybersecurity woes,
A Palestinian information system expert says he was forced to post a bug report on Mark Zuckerberg’s Facebook page after the social network’s security team failed to recognize that a critical vulnerability he found allows anyone to post on someone’s wall.
A paper presented at last week’s USENIX Security Symposium in Washington described how a group of security researchers at Georgia Tech
User-profiling is an interesting approach to countering phishing.
Security tools today have been designed to provide reams of raw data about the security state of corporate applications.
Portcullis regularly gets contacted by organisations seeking help with regards to cyber attacks.
The primary approaches used to fight cybercrime over the past several years simply aren’t effective.
FireEye security experts discovered a new series of cyber attacks conducted by Chinese hackers targeted the US media in 2012, the attackers have improved the malware used in previous campaign against the New York Times.