Even reports of crims offering signing-as-a-service. Underground cybercrooks are selling digital certificates that allow code signing of malicious instructions, creating a lucrative...
Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it...
Denis Andzakovic, a security researcher for Security Assessment, has created a tool that can fool the KeePass password manager into exporting its...
Wallets are becoming more integrated with other things. Soon, we might all use our phones as a way to pay for things....
Earlier this month, exploit acquisition platform Zerodium debuted an iOS 9 bug bounty that would pay out up to three million dollars...
Researchers have discovered an Android malware disguising itself as a Microsoft word document which triggers a malicious code once opened. This Android malware was...
Facebook’s is always changing and its team is adding new functionality every couple of months. With new changes there are chances of...
Timing attacks are an interesting part of computer security. As an extreme example, imagine that your computer took one second to verify...
Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting...
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two...
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details....
My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the...
The European Parliament has voted in favour of a resolution that calls on all EU member states to “drop any criminal charges...
A cyber-security industry group has published new research on the CryptoWall ransomware campaign, finding that the attacks have generated more than $300m...
The two platforms drive different devices. But would combining them really be a bad thing? On Thursday, the The Wall Street Journal...
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to...
Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and...
A silver Jaguar XFR parked in a parking lot in Auckland, New Zealand was stolen with the help of a hacking device that sends...
Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a...
US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty program. What...
Timing attacks has proven practical since 96′ as shown in a paper by Paul C. Kocher. In his paper Paul demonstrate how,...