Spam campaigns that have active during the last several months have been distributing the Redaman banking malware, Palo Alto Networks security researchers say. read more Source: Ongoing Campaign Delivers Redaman Banking Trojan
Read MoreYour likes, interest and personality can be gleaned from as few as 8-9 friends on social media, whether you’re on the platform or not. Source: #DeleteFacebook? #DeleteTwitter? #FatLotOfGood that will do you
Read MoreYou can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises – as a means of attacking rival government targets. Source: Collateral Damage: When Cyberwarfare Targets Civilian Data
Read MoreTwo-factor authentification has been hailed as a significant move forward in providing online security, letting us log in with confidence to sites such as Gmail. Websites that once required an insecure password now need a complex password with a second form of authentication from a mobile device, or implement other two-factor systems. Source: Hackers find…
Read More
Recent Comments