Millions of Apple iOS mobile devices are leaking information like the exact location of devices and their owners.
Fancy Bear Spying Targets 1000s, Including NATO, Political Leaders
The Kremlin-tied group has created legions of custom programs, backdoors, bootkits and rootkits to assist it in its spying.
Trump’s Turn to Face Questions Over Poor Email Security
Republican candidate’s corporate servers are wide open, says researchers
Routers Branded ‘Achilles Heel’ of Home and Small Biz Security
Eset research finds numerous vulnerabilities
Researchers Find Dangerous Intel Chip Flaw
Side channel issue may increase potency of cyberattacks
#ISC2CongressEMEA: Smart City Risk Factors Could Lead to Loss of Life
At the (ISC)2 Congress in Dublin, Ireland, on October 19, security analyst Megha Sharma presented her research and risk assessment of the three key areas in a smart city
TrickBot Banking Trojan, Heir to Dyre
TrickBot shares much in common with the Dyre malware, which became notorious in late 2014 and early 2015.
PassCV Targets Pokémon Go, Online Gaming Platforms
A large cluster of attacks against game developers uses malware designed to harvest stored passwords and log keystrokes.
City of London Hit by More Ransomware Than Some Countries
Cybercriminals target major financial institutions in Square Mile
#ISC2CongressEMEA: Why CEO Fraud Works and How to Stop it
CEO Fraud is the latest variation in a plethora of similar email-based cyber-attacks. It’s niche, but it has a 90% success rate