Security News
![Attacking Researchers Who Expose Voting Vulnerabilities (Schneier on Security)](/static/build/img/news/alt/antivirus-stats-small.jpg)
Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....
![Deadly combination of Upatre and Dyre Trojans still actively targeting users (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
Upatre (or Waski) is a downloader Trojan that has lately become the malware of choice for cyber crooks to deliver additional, more dangerous malware on users' computers. A few weeks ago, Swiss and ...
![MitM, DoS bugs in Network Time Protocol squashed (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest version of the protocol daemon...
![Polymorphic Beebone botnet sinkholed in international police operation (Help Net Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ computers. Initial figures show tha...
![Apple iOS 8.3 Includes Long List of Security Fixes (Threatpost)](/static/build/img/news/alt/hackers-statistics-small.jpg)
Apple has released iOS 8.3, a major security upgrade for iPhone and iPad users that includes patches for more than three dozen vulnerabilities. The new version of iOS has security fixes for...
![Report: Security in the age of enterprise technology (Help Net Security)](/static/build/img/news/alt/cost-stats-small.jpg)
The following report will help you gain advantage through proactive use of network security:Enabling business through new services and process improvementsAligning lines of business, risk management...
![French broadcaster TV5Monde says it was victim of Islamist hacking (Yahoo Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
![The need for end-user visibility in a Bring Your Own Anything environment (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
Mobiles, tablets, PCs, applications, cloud services - employees are increasingly bringing non-company devices into their organizations and connecting them to everything they need to do their jobs. As ...
![Cybercrime gets easier, attribution gets harder (Help Net Security)](/static/build/img/news/alt/breach-statistics-small.jpg)
Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a host of other techniques ...