Posted on 14 July 2014. | Researchers have analyzed five popular web-based password managers and have discovered - and then responsibly reported - vulnerabilities that could allow attackers to learn a user’s credentials for arbitrary websites.
Posted on 14 July 2014. | This particular gang used stolen credit cards to register as guests at the hotels in question, and then freely used the computers in the hotel business center. They would log into their Gmail account, download from it and execute key logging software.
Posted on 10 July 2014. | Nearly 70% of companies that are responsible for the world's power, water and other critical functions have reported at least one security breach that led to the loss of confidential information or disruption of operations in the past 12 months.
Posted on 9 July 2014. | Nearly two-thirds of UK IT decision-makers said they expect their organization to be the target of a cyber attack within the next 12 months. 32% of those surveyed confirm their business was hit by a cyber attack during the past year.
Posted on 8 July 2014. | DDoS attacks are quickly becoming the preferred method for cyber attackers to wreak havoc on the internet. With a recent spate of attention grabbing headlines focused on the hacker's favorite tool, this article busts some myths about DDoS attacks.