Security News
!["Row hammering" - how to exploit a computer by overworking its memory (Naked Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
By overcooking your computer's memory, you may be able cause data corruption. But can you turn that into a deliberate security exploit? Google's Project Zero researchers say, "Yes!"
![CS:GO players targeted with phishing attempt, malware (Help Net Security)](/static/build/img/news/alt/antivirus-stats-small.jpg)
Typosquatting is an effective means to trick users into believing they have landed on the legitimate site they wanted to visit, so it's no wonder that it's often used by phishers The latest phishin...
![2,400 unsafe mobile apps found in average large enterprise (Help Net Security)](/static/build/img/news/alt/application-stats-small.jpg)
The average global enterprise has approximately 2,400 unsafe applications installed in its mobile environment, according to Veracode. Based on an analysis of hundreds of thousands of mobile applic...
![Facebook to let marketers see what people are talking about (Naked Security)](/static/build/img/news/alt/antivirus-stats-small.jpg)
Pick your marketing keyword. Example: "frizz." Facebook's ready to offer (anonymised) data to the anti-frizz marketers about who's saying what.
![MS Update 3033929 Causing Reboot Loop (Krebs on Security)](/static/build/img/news/alt/managed-security-small.jpg)
One of the operating system updates Microsoft released on Tuesday of this week -- KB3033929 -- is causing a reboot loop for a fair number of Windows 7 users, according to postings on multiple help...
![Cyber crooks take advantage of ad bidding networks to deliver ransomware (Help Net Security)](/static/build/img/news/alt/phishing-stats-2-small.jpg)
Malware peddlers are taking advantage of real time advertising bidding networks to deliver ransomware to unsuspecting users, FireEye researchers are warning. "Real Time Bidding is an ad sale and de...
![Analysis of Equation Group's espionage platform discovers another link to the NSA (Help Net Security)](/static/build/img/news/alt/antivirus-stats-small.jpg)
Kaspersky Lab researchers continue to analyze the software and digital artifacts tied to the Equation Group, a nation-state threat actor that has been active for almost twenty years, and to present th...
![How much pressure do infosec professionals face? (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Businesses were under increased pressure to secure their organizations in 2014 and expect that pressure to increase in 2015, according to Trustwave. Survey espondents also reported pressure to ro...
![Update Tuesday wrap-up, March 2015 - FREAK fixed fast, and lots more from Microsoft (Naked Security)](/static/build/img/news/alt/breach-statistics-small.jpg)
Update Tuesday wrap-up, March 2015 - FREAK fixed fast, and lots more from Microsoft (Naked Security)
Adobe published no bulletins for March 2015, so this one is all about Microsoft...
![As confidence sinks, cyber attacks rise (Help Net Security)](/static/build/img/news/alt/DDoS-small.jpg)
While IT security spending is increasing, confidence is falling. In surveying more than 800 security decision makers and practitioners, the CyberEdge Group found that more than 70 percent of responden...