A Week in the News: Still Talking About Heartbleed
The OpenSSL Heartbleed bug that could expose passwords, communications, and encryption keys continues to dominate news headlines across the security industry
1194 articles
The OpenSSL Heartbleed bug that could expose passwords, communications, and encryption keys continues to dominate news headlines across the security industry
The concept of mobile malware working in bond with computer Trojans to steal money via online banking is not new, however Kaspersky Lab Q1 report indicates that it quickly gaining “market share”.
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their vacations this time of year.
We put too much trust in the Internet. And we need to understand that security products and solutions should compliment a secure mindset.
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
UPDATE: A previous version of this article stated – citing a list on Github – that users on a site called HideMyAss were affected by Heartbleed. A spokesperson from that
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
Mobile malware is the hottest topic among cybercriminals and the number of malicious mobile apps is rapidly growing. The reason for that is obvious – there are multiple ways to
The criminals continue to do their bad business and law enforcement agencies successfully chase them down. That happens every month, so here are the most interesting cases from March. A
In the days of cyberwars and cybermafia, it’s hard to recall times when computer viruses and worms were just research projects or pranks. Back then, there were no monetary incentive
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Perhaps it has happened to you. One day you open your Internet browser and instead of going to your usual homepage, you go to the landing page of a search
Malware inflicts damage to your system, yet is ephemeral and rarely visible to the naked eye, especially in digital domains beyond your own PC. But nevertheless, you have an opportunity
A variety of methods can lead users to malicious sites, but the one known as “typosquatting” relies entirely on unforced user error.
A number of Samsung’s popular Galaxy devices reportedly contain an alleged backdoor that could give attackers remote control of vulnerable handsets, effectively turning successfully exploited phones into mobile spying machines.
If you try to think of the most secure place in the world, you probably think of some military bunker or U.S. President’s hiding vault. But for us ordinary folks,
No doubt it has been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin exchange marketplace out there, has shut down, putting a
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
The Onion Router Tor, one of the resources on Darknet, has been known for a long time. At first it was only known of by experts and enthusiasts interested in
The growth of cyber threats targeting mobile devices has grown hand-in-hand with the increasing ubiquity of mobile devices in everyday lives. The range of threats grows just as rapidly as