Attackers can exploit an Android vulnerability discovered a year ago to trick users into downloading malicious apps from third-party stores, Read More.
A new technique is coming into play by attackers which allow them to fool even more users into believing they Read More.
The “Pitty Tiger” advanced persistent threat (APT) group may have been active for over six years, researchers said. The activities Read More.
Attackers are exploiting commonly-used business applications to bypass security controls, a new report said. Common sharing applications such as email, Read More.
As more companies focus on mobility, it is no real surprise the lack of security on devices continues to be Read More.
The use of the right-to-left override (RLO) character in Unicode, a tactic that enables malware authors to hide the real Read More.
A “loophole” in Google Cloud Messaging (GCM) lets attackers control some nasty Android Trojans. Cyber criminals use Google Cloud Messaging, Read More.
Attackers are using a known, but uncommon method of maintaining access to an already compromised server by hiding backdoors inside Read More.
With all the public incidents where hackers attacked various organizations, it is still apparent companies do not prioritize cyber security Read More.
Security usually ends up being a matter of vigilance, so the longer it takes to understand the system is under Read More.