•  
  • By Catalin Cimpanu
  • September 23rd, 2015
New Adware Facilitates the Distribution of Trojans for Mac Users

New Adware Facilitates the Distribution of Trojans for Mac Users

Adware.Mac.WeDownload.1 serves as a gateway drug for more serious Mac malware infections, usually trojans

  •  
  • By Catalin Cimpanu
  • September 22nd, 2015
Security Fixes Delayed Apple's WatchOS 2.0

Security Fixes Delayed Apple's WatchOS 2.0

Apple fixes 38 security issues in its recent 2.0 release

  •  
  • By Catalin Cimpanu
  • September 21st, 2015
Ransomware Affects Everyone, Even Sex Shops

Ransomware Affects Everyone, Even Sex Shops

Queensland adult store falls victim to spam-based ransomware

  •  
  • By Catalin Cimpanu
  • September 20th, 2015
Anonymous, AntiSec and HagashTeam Deface Vietnamese Websites in a Joint Operation

Anonymous, AntiSec and HagashTeam Deface Vietnamese Websites in a Joint Operation

Vietnam frees 18,200 prisons, but no political dissidents

  •  
  • By Catalin Cimpanu
  • September 19th, 2015
Kremlin Blames Recent DDOS on US Hackers

Kremlin Blames Recent DDOS on US Hackers

Hackers tried to alter Election Day data

  •  
  • By Catalin Cimpanu
  • September 19th, 2015
GitHub Implements Subresource Integrity to Better Protect Itself from XSS Attacks

GitHub Implements Subresource Integrity to Better Protect Itself from XSS Attacks

Company opts to prevent rather than fix security problems

  •  
  • By Catalin Cimpanu
  • September 18th, 2015
80 Percent of Malware Goes to Your Windows PC, the Rest to Your Android Phone

80 Percent of Malware Goes to Your Windows PC, the Rest to Your Android Phone

Windows remains more vulnerable despite Android's popularity

  •  
  • By Catalin Cimpanu
  • September 18th, 2015
D-Link Accidentally Publishes Code Signing Keys

D-Link Accidentally Publishes Code Signing Keys

Someone forgot the keys inside the firmware's source code

  •  
  • By Catalin Cimpanu
  • September 17th, 2015
Infographic: The Anatomy of a Data Breach

Infographic: The Anatomy of a Data Breach

On average, data breaches cost companies $3.79 million

  •  
  • By Catalin Cimpanu
  • September 17th, 2015
Infographic: The Darknet

Infographic: The Darknet

Also included, a report on how to properly access it

  •  
  • By Catalin Cimpanu
  • September 17th, 2015
One in Two Internet Users Stumbled Upon Malware in the Last Year

One in Two Internet Users Stumbled Upon Malware in the Last Year

Malware caused damages of $160 / €140 per incident

  •  
  • By Catalin Cimpanu
  • September 15th, 2015
Secunia Acquired by Flexera Software

Secunia Acquired by Flexera Software

Flexera Software boosts its portfolio with new tools to help discover and mitigate software vulnerabilities

  •  
  • By Catalin Cimpanu
  • September 15th, 2015
Top 20 Ashley Madison Passwords

Top 20 Ashley Madison Passwords

And they're all as terrible as you'd think they are

  •  
  • By Catalin Cimpanu
  • September 15th, 2015
Infographic: The Top 5 Most Hackable Cars on the Road

Infographic: The Top 5 Most Hackable Cars on the Road

2014 Jeep Cherokee deemed the most hackable car

  •  
  • By Catalin Cimpanu
  • September 14th, 2015
File-Sharing Site ShareBeast.com Shut Down by Authorities

File-Sharing Site ShareBeast.com Shut Down by Authorities

FBI takes down the US' biggest music file-sharing portal

  •  
  • By Catalin Cimpanu
  • September 13th, 2015
With Car Hacks on the Rise, Argus Automotive Cyber-Security Firm Raises $26M

With Car Hacks on the Rise, Argus Automotive Cyber-Security Firm Raises $26M

There's a general need for security products for smart cars

  •  
  • By Catalin Cimpanu
  • September 12th, 2015
What's in Google's First Monthly Batch of Android Security Updates

What's in Google's First Monthly Batch of Android Security Updates

Google keeps its word, announces the content of its first OTA

 
Want more? Browse: