2 min read - According to the recent "State of Mobile Apps Security" report, popular iOS and Android apps have been hacked, highlighting the need for boosted security.
2 min read - The Shellshock vulnerability has spawned a new wave of attacks using Bashlite, a malware variant aimed at devices using BusyBox open-source software.
2 min read - New, low-cost malware tools such as Predator Pain and Limitless pose a growing threat to small and midsize businesses (SMBs), according to Trend Micro.
3 min read - Stolen vendor credentials are to blame for the recent Home Depot breach, giving attackers the access they needed to get into high-level systems.
2 min read - Security experts say unless users upgrade to the latest firmware, a type of Belkin router that has been on the market since 2011 may be open to attacks.
3 min read - A malicious hacking crew, possibly based out of South Korea, has been quietly stealing data from high-level hotel guests with the Darkhotel malware.
2 min read - The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
2 min read - A Trojan that security researchers have dubbed WireLurker infects Macs running OS X and then steals information on iOS devices after connecting via USB.
2 min read - A flaw in the Drupal content management system may affect many websites, but security leaders have released some steps to help mitigate the risk.
2 min read - A sharp increase in Crowti ransomware infections during October is the latest indication that spam emails are still effective, according to Microsoft.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.