When Lavabit — an email service that National Security Agency leaker Edward Snowden used — suspended service last week amid hints that it had received a government demand for information
Browsing: Malware and Vulnerabilities
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
The Snowden incident where, according to the New York Times (21Jun2013), a government intelligence worker was able to easily copy and disseminate large amounts of highly sensitive and classified data
DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed. Microsoft will stop releasing security updates for the OS on that date.
The Central Tibetan Administration website has been hacked to serve up a Java exploit that drops advanced malware, marking the latest attempt to compromise people hoping for freedom from Chinese control in the province.
Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that it has joined the Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) as a sponsoring member.
Online gamers have become a prime target for cybercriminals – with attacks this year targeting major game publishers such as Ubisoft and Nintendo, and developers such as Crytek.
It is not uncommon to see social media accounts, specifically Twitter accounts, directing users to malicious sites such as the ones hosting Android.Opfake, an issue we blogged about last year.
Call it insult to injury: Android users are used to being frequent malware targets, but they have other security issues to consider as well.