Security News


A China-based APT group has been using Microsoft’s TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers have revealed. "While other g...

United Airlines has become the first airline to start a bug bounty program and instead of monetary rewards, it offers air miles: a million for remote code execution bugs, 250,000 miles for medium seve...


The highly debated USA FREEDOM Act, a bill whose purpose is "to rein in the dragnet collection of data by the NSA and other government agencies, increase transparency of the Foreign Intelligence Surve...

Potentially unwanted programs (PUPs) might not be as dangerous as malware, but can often lead to unexpected perils. Take for example WinYahoo. Despite it's name and the fact that, among other thing...

In the era of cloud technology, online attacks are becoming more sophisticated. The days of drive-by exploitation are passing us by, replaced by attackers who run continuous penetration and vulnerabil...

The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible to spammers, according to...

Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organization’s perimeter. As a...

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent said sufficient policies/c...