Trend Micro has found four malicious apps, which criminals can use to siphon their victims’ online passwords and contacts in order to give them more leverage with victims.
Guest Wi-Fi Flaw Endangers Devices, Full Hotel Networks
Attackers can take full control of a device and even access the hotel’s guest management system with a simple exploit.
Software Flaws Jump 20% in 2014 as Zero Days Soar – Report
Tough times for IT teams tasked with patching
Israeli Researchers Jump the Air Gap with BitWhisper
New technique could compromise maximum security computers
F-Secure Router Checker Scans for Malicious DNS Activity
One-click tool can tell you if hackers have been redirecting your traffic
Multiple Digital Certificate Attacks Affect 100% of UK Businesses
Researchers say a “Cryptoapocalypse” would dwarf Heartbleed in scope, complexity and time to remediate.
Vawtrak is Back and Stronger than Ever
The financial trojan is targeting new countries and building a thousands-strong botnet, representing a top emerging threat.
Center for Internet Security Aims at AWS
Organizations can now leverage cloud-based resources configured for best-practice security controls.
UK Government Coughs Up £5m in Cybersecurity Funding
Money will go into Belfast’s Centre for Secure Information Technologies
UK Government Coughs Up £5m in Cybersecurity Funding
Money will go into Belfast’s Centre for Secure Information Technologies