Security News

Attacking Researchers Who Expose Voting Vulnerabilities (Schneier on Security)
2015-04-09 11:45

Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....

Deadly combination of Upatre and Dyre Trojans still actively targeting users (Help Net Security)
2015-04-09 11:11

Upatre (or Waski) is a downloader Trojan that has lately become the malware of choice for cyber crooks to deliver additional, more dangerous malware on users' computers. A few weeks ago, Swiss and ...

MitM, DoS bugs in Network Time Protocol squashed (Help Net Security)
2015-04-09 10:14

Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest version of the protocol daemon...

Polymorphic Beebone botnet sinkholed in international police operation (Help Net Security)
2015-04-09 10:01

On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ computers. Initial figures show tha...

Apple iOS 8.3 Includes Long List of Security Fixes (Threatpost)
2015-04-09 09:00

Apple has released iOS 8.3, a major security upgrade for iPhone and iPad users that includes patches for more than three dozen vulnerabilities. The new version of iOS has security fixes for...

Report: Security in the age of enterprise technology (Help Net Security)
2015-04-09 08:27

The following report will help you gain advantage through proactive use of network security:Enabling business through new services and process improvementsAligning lines of business, risk management...

The need for end-user visibility in a Bring Your Own Anything environment (Help Net Security)
2015-04-09 06:48

Mobiles, tablets, PCs, applications, cloud services - employees are increasingly bringing non-company devices into their organizations and connecting them to everything they need to do their jobs. As ...

Cybercrime gets easier, attribution gets harder (Help Net Security)
2015-04-09 06:45

Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a host of other techniques ...