Mobile threats are everywhere – here’s what you can do

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Where would we be without them? If you’re anything like me, making a phone call is the fifth or sixth reason to reach […]

Read more

Rootpipe — Critical Mac OS X Yosemite Vulnerability Allows Root Access Without Password

A Swedish Security researcher has discovered a critical vulnerability in Apple’s OS X Yosemite that gives hackers the ability to escalate administrative privileges on a compromised machine, and allows them to gain the highest level of access on a machine, […]

Read more

The Hacker News: Microsoft Windows Zero-Day Vulnerability “CVE-2014-4114” Used to Hack NATO

Once again a Russian cyber espionage group has gained media attention by exploiting a Zero-day vulnerability in Microsoft’s Windows operating system to spy on the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive […]

Read more

Bash bug fallout: Shell Shocked yet? You will be … when this becomes a worm

Much of the impact of the Shell Shocked vulnerability is unknown and will surface in the coming months as researchers, admins and attackers (natch) find new avenues of exploitation. The vulnerability, coined Shell Shocked by researcher Robert Graham, existed in […]

Read more

Hackers exploiting Internet Explorer to expose security flaws on a huge scale

Hackers and cybercriminals are using flaws in Microsoft’s Internet Explorer to search computers to discover what kinds of security software they are running and how to take control of them, security researchers claim. The exploits are allowing digital reconnaissance to […]

Read more