11 zero-days uncovered in Samsung Galaxy S6 Edge
Samsung's popular Galaxy S6 Edge smartphone is drowning in vulnerabilities.
Security update kills several critical bugs in Android Marshmallow
Google's November Android security update carries fixes for seven vulnerabilities.
Stanford researchers identify potential security hole in genomic data-sharing network
Sharing genomic information among researchers is critical to the advance of biomedical research.
Hacking Team pitches encryption-cracking tools to US law enforcement
Hacking Team is back in the saddle, knocking on the doors of US law enforcement.
Most consumers believe cloud-based apps can be hacked
Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data.
Spotlight
Researchers map out hard-to-kill, multi-layered spam botnet
A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems.
Open source KeeFarce tool loots encrypted passwords stored in KeePass
A researcher with security consultancy Security-Assessment.com has released the source code for KeeFarce, a tool that can export all information stored in the database of a user's KeePass password manager.
Nearly 2% of all smartphones are compromised or high risk
Risks increase over time. In one month, about 22 percent of devices will encounter network threats, with that number jumping to 40 percent over the following three months. The majority of devices are not equipped to fight these threats.
US DOJ admits that Stingrays can be used to intercept call and SMS content
The American Civil Liberties Union of Northern California has emerged victorious and has been given access to documents that spell out the details about the US federal government’s use of Stingrays surveillance devices.
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.


























