Leeds man gets 20-week suspended sentence
UK Doctors Routinely Send Sensitive Patient Info by Text
Privacy fears after BMJ survey reveals dangers of BYOD
Moker RAT Has Unusual Characteristics
It can operate as a local access trojan, without a command & control server, receiving its commands locally, through a hidden control panel.
Samsung Pay Provider Hacked Secretly for Months
China suspected of grabbing IP from LoopPay
Malicious Android Adware Kemoge Roots Victim Devices
FireEye warns users not to click on suspicious links
Iran Threat Group Uses Fake LinkedIn Network to Target Victims
A network of fake LinkedIn profiles has been created to help the threat actors target potential victims through social engineering.
Cisco Snares Angler Cybercrime Group Worth $30m Annually
Talos group disrupts proxy network making a fortune from ransomware
VASCO to Acquire Silanis
Silanis provides electronic signature (e-signature) and digital transaction solutions used to sign, send and manage documents.
ID Theft Victims Remain Vulnerable Long After A Hack
Over a long-term period compromised identities are seen moving industries, likely in an attempt to defeat traditional fraud detection tools.
Attack Vector Aims at Microsoft Outlook Web Application
Attackers could record authentication credentials and be provided with complete backdoor capabilities.