April 27, 2015 New iOS 8 Vulnerability Taps Worrisome Wi-Fi Exploit 2 min read - A new type of iOS 8 vulnerability combines WiFiGate and an SSL compromise to cripple iPhones, according to mobile security firm Skycure.
April 27, 2015 Microsoft Bug Bounty Program Offers Big Rewards for Finding Flaws in Project Spartan, Windows 10 2 min read - Security researchers are invited to submit vulnerability reports and a functioning exploit in return for cash as part of the Microsoft bug bounty program.
April 23, 2015 Vulnerability in Magento Could Have Exposed 200,000 E-commerce Sites to Attack 2 min read - A vulnerability in Magento — the e-commerce platform owned by eBay — was patched but could have left more than 200,000 sites exposed to cybercriminals.
April 23, 2015 Research Suggests Being Hit by Mobile Malware Is as Rare as Being Struck by Lightning 2 min read - Damballa unveiled results of a two-year study at the RSA Conference that showed mobile malware threats may be overhyped — as rare as a lightning strike.
April 23, 2015 New Cyberattacks Put Public Officials’ Private Data at Risk 2 min read - New cyberattacks are putting public officials' private data at risk as cybercriminals use an informationg gathering technique known as doxing.
April 22, 2015 PayPal Suggests Biometric Identification Will One Day ‘Kill All Passwords’ 2 min read - A login mechanism you could eat, digital tattoos and vein recognition could be among the biometric identification tools that protect users, PayPal says.
April 21, 2015 Google Ad Services Pushes for Near-Total Traffic Encryption to Fight Malvertising 2 min read - In response to growing incidents of malvertising, Google Ad Services has announced that the majority of its traffic will be encrypted by June 30.
April 17, 2015 Dropbox Bounty: Big Bucks for Bugs? 2 min read - The new Dropbox bounty program looks to catch software vulnerabilities in their infancy by rewarding researchers. So far, payouts have no maximum.
April 17, 2015 SearchBlox Vulnerabilities Underscore the Importance of Updating Enterprise Search Tools 2 min read - A set of four SearchBlox vulnerabilities could allow cybercriminals to conduct cross-site scripting attacks and cause other potential problems.
April 17, 2015 Verizon Report Suggests Data Breach Costs and Mobile Threat Perceptions Inaccurate 2 min read - Security experts may be overestimating the cost of a data breach and the extent of mobile device threats, according to a report from Verizon.