Google Chrome to Warn Against Potentially Harmful Software

New security measure aims at applications that alter browser settings
by Ionut Ilascu, August 19th, 2014
App Servers and Base Transceiver Stations Next Targets for Mobile Hackers

App Servers and Base Transceiver Stations Next Targets for Mobile Hackers

by Ionut Ilascu, August 18th, 2014
Cybercriminals could route communication through their infrastructure
Shanghai Officials Change iPhone, Samsung Phones for Alternative with Encryption Functionality

Shanghai Officials Change iPhone, Samsung Phones for Alternative with Encryption Functionality

by Ionut Ilascu, August 14th, 2014
Move made in the wake of recent news on iPhone being surveillance prone
 

Boleto Malware Borrows Evasion Techniques from Zeus Trojan

Payloads are slipped into the system without alerting defense mechanisms
by Ionut Ilascu, August 14th, 2014
 

Crooks Use "Amazon 90% Discount Coupon" Phishing Lure

Email purports to be sent from Amazon support team on birthday occasion
by Ionut Ilascu, August 13th, 2014
 
Want more? Browse: