Security News


Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple's App Store and iTunes web apps, which can lead to "session hijacking, persistent phishin...

The problems with passwords have already been well documented, and the main problem with static biometrics ("something you are": fingerprints, retina patterns, etc.) is that they can't be changed. ...


Git is the most popular tool for software version control out there. Created by Linus Torvalds to facilitate Linux kernel development, Git is a boon for software developers as it allows different deve...

Social bookmarking web service Delicious has released a free beta version of Dmail, an extension for the Chrome browser which allows senders to delete an email they sent and have regretted sending soo...

There's a need for organizations to reduce time to detection (TTD) in order to remediate against sophisticated attacks by highly motivated threat actors, according to the Cisco 2015 Midyear Security R...

Elastica discovered a new Google Drive-based advanced phishing campaign initiated by unknown attackers. The attackers used JavaScript code obfuscation and compromised websites in order to steal end-us...

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists and blacklists – are only d...

There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer services. How will those servi...