Android root malware widespread in third-party app stores
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.
Malwarebytes said it may take three to four weeks to fix flaws in its consumer product found by Google security researcher Tavis Ormandy.
“Government and the private sector will begin to see the benefit of cybersecurity foresight."
There hasn't been a lack of strange things turning up in the Ashley Madison data leak. One of the latest discoveries comes from Trend Micro, which found bogus Ashley Madison profiles that used email addresses the company created solely for collecting spam samples.
A closely watched band of suspected Russian hackers have spied on domestic targets, including two members of the outspoken punk rock band Pussy Riot.
Prolific cyber attacks against Sony capped off one of the biggest years on record for cyber security, as Kiwi organisations recognise the need to protect against data breaches in 2015.
“Our findings confirm that we are battling rapidly moving cyber-criminals and evolving vulnerabilities simultaneously."
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.