Trustwave announced Tuesday that it has acquired Cenzic for an undisclosed sum, thus combining Trustwave’s static application security testing capabilities and Cenzic’s dynamic application security testing into a single platform.
Trustwave Acquires Cenzic to Add Dynamic Testing
Trustwave announced Tuesday that it has acquired Cenzic for an undisclosed sum, thus combining Trustwave’s static application security testing capabilities and Cenzic’s dynamic application security testing into a single platform.
Commercial RAT Used by Malicious Hackers
Win-Spy is a commercial off-the-shelf (COTS) stealth monitoring tool. “Start Spying on any PC or Phone within the Next 5 minutes,” says its website. With such products generally available, why should hackers go to the trouble of developing their own RA…
Join the Grand Theft Auto 5 PC Beta Program Scam
Everybody likes to be first. Publications like to be the first to publish news, politicians like to be the first with good news, and gamers like to be the first to experience a new game. That’s what makes gamers such obvious targets for scams, spam and…
Hollywood Likely to be Targeted by Chinese Hackers
Hollywood appears to be emerging as a prime target not just for video pirates, but for Chinese hackers. This is the conclusion of security researchers who have examined the probable attitude of China toward the cultural impact of Hollywood.
Security in Apple’s iOS 7 Weaker, Not Stronger, than iOS 6
Aware of weaknesses in the early_random() pseudo random number generator used in iOS 6, Apple switched to an entirely new generator in iOS 7. In doing so, however, it weakened rather than strengthened the random number generation that lies at the heart…
LightOut is Latest Cyber Threat to Target Energy Sector
What happens when the energy grid goes down? Well the lights, of course, go out. A fresh advanced persistent threat (APT) targeting the energy sector is thus aptly named LightsOut, and like previous attacks, it used a watering hole method to start its …
Backdoor Found in Samsung Galaxy
A developer working on Replicant, an open-source free mobile operating system designed to replace all proprietary Android components with open-source alternatives, has discovered a backdoor in Samsung Galaxy that provides almost full access to user fil…
Nokia Tackles Carrier Roles in Mobile Security with Berlin-based Cybersecurity Center
With the infiltration of handheld devices into virtually every aspect of our consumer and enterprise lives, mobile networks should be considered critical infrastructure with high impact on public welfare and safety; and cyber-security should be address…
Target May Have Ignored Pre-breach Intrusion Warning
The largest retail breach in history happened at Target stores all over the country during the busy 2013 holiday shopping season, sparking 90+ lawsuits, a Congressional hearing, corporate restructuring and plummeting sales figures for the big-box retai…