Valentine’s Day break-up on the cards for insecure algorithm
ESET: CEO Fraud – Understanding How it Works
Protecting yourself from CEO fraud comes down to understanding how an attack works
SIM Box, OTT Bypass Growing Threats to Mobile Operators
More than 80% of operators said they are experiencing SIM box fraud, draining revenue.
Why Should I Get A Monitored Smoke Detector?
Most homes have some sort of smoke alarms. They may have been installed by the builder of your home or added by you in the form of battery operated smoke alarms. What a lot of people don’t know is that you can add smoke detectors to your home security …
Twitter Celebs and Corporate Accounts Hacked Through Third Party
Attackers compromised Twitter Counter to post messages
BlackNurse DDoS Takes Just One Laptop to Nix a Network
The offensive is capable of taking down networks. In fact, an average laptop can produce about a 180Mbps DDoS attack.
Qualcomm Launches Bug Bounty for Mobile Processors
The program offers up to $15,000 for vulnerabilities found in the Qualcomm Snapdragon family of mobile processors.
Android Vulnerability Affects 2.8 Million Devices
The flaw makes phones vulnerable to man-in-the-middle attacks, allowing arbitrary commands as a privileged user.
Three Arrested After Suspected Insider Breach at Three
UK operator under fire after men intercept upgrade devices