Spyware in disguise passes for legitimate Android apps in Google Play.
Phishing Template Uses Fake Fonts
A first-of-its kind phishing template exploits web font features, says Proofpoint.
Marriott Hackers Got Millions of Passports Numbers
As the investigation continues, Marriott issues a data breach update.
Millions of Tower of Salem Gamers Hit by Breach
Data stolen includes IP addresses, emails and hashed passwords
German Politicians Caught in Massive Data Leak
Only far right politicians appear to have been spared
US Cloud Hoster Receives Christmas Ransomware ‘Gift’
Data Resolution claims to be victim of Ryuk strain
Life at Akamai: Making Connections
By the numbers, Akamai’s scale, reach and ability to help brands connect users to immersive and immediate online experiences while protecting their businesses from threats, is quite impressive. While I’m proud that Akamai connects with billions of devi…
Low, Medium and High Interaction Honeypot Security
Honeypots are a popular way to protect data centers and learn about attackers. Learn the difference between high and low interaction honeypot security.
EU Launches Bug Bounty for 15 Open Source Projects
The European Commission will award bounties in the third round of its free and open source software audit.
Terrified PewDiePie Hacker Bids Dramatic Farewell
After targeting Chromecast, TheHackerGiraffe grew scared of getting caught.