Security News



Polish firm Security Explorations has published technical details and PoC code for several security issues identified in Google App Engine (GAE) for Java. The company has found over 30 vulnerabilit...

Google has released a new report on its implementation of "right to be forgotten" requests, and has revealed that it has removed 58.7 percent of the URLs it was asked to drop from search results. T...

Google is slowly but surely working on preventing developers of malicious Chrome extensions from delivering their wares to users. First, in May 2014, they made it so that extension that are not hos...

mSpy, a company that sells "customized and user-friendly mobile and computer monitoring solutions," has apparently suffered a data breach. They still haven't confirmed it, but according to Brian Kr...



Advances in security technology are making many payment channels safer than ever for consumers, however, they are also forcing professional fraudsters to concentrate on an ever-diminishing number of m...

As more and more organizations are being targeted by cyber criminals, questions are being raised about their planning, preparedness, and investment into cyber security in order to tackle such incident...