Researchers were able intercept payloads with details of 51 websites used by spammers to sell counterfeit drugs.
Two-Thirds of Apps Using Open Source Have Known Software Vulns
85% contain license conflicts
Mastercard’s Biometric Card Promises “Apple Pay” Without the Phone
Fingerprint reader is embedded in payment card for low friction check-out
#IAPP Conference: Panel – Whose Eye is on the Five Eyes? An Intro to International Oversight Bodies
A panel of privacy commission representatives discussed the role of their organizations amid heightened public concern over state surveillance activities
Researchers Find Multiple RCE Bugs in Linksys Routers
IOActive works with manufacturer on issues with Smart Wi-Fi models
Android SMS Spyware Sees Millions of Downloads
SMSVova can steal and relay a victim’s location to an attacker in real time.
Mirai-Busting Hajime Worm Could be Work of White Hat
P2P-controlled malware blocks IoT device access to suspect ports
Hundreds of Google Play Apps Infected with the BankBot Trojan
It infiltrates benign programs, hitching a ride to installation on users’ phones. Then it steals banking credentials and card details.
Bad Guys Still Rely on Marks to Click on Something
On Monday holidays, alerts dip significantly, due to a lack of employees interacting with malicious emails, attachments and links.
#CRESTCon & IISP Congress: Passive Data Sources Can Make System Mapping Great Again
There is a lot to learn from listening to our systems