Posted on 22 October 2014. | A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid.
Posted on 21 October 2014. | Spotlight can now also be used to make searches on the Internet, and it sends the users' search queries and information about their physical location to Apple.
Posted on 20 October 2014. | China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked.
Posted on 17 October 2014. | US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.
Posted on 23 October 2014. | Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.
Posted on 22 October 2014. | A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.
Posted on 21 October 2014. | Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.
Posted on 20 October 2014. | The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has recognized how critical the state of software security is to the DHS mission.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.