A group of researchers discovered a flaw in the protocol used in telecommunications networks that could enable fraudsters to pursue at least 10 different types of 4G LTE attacks.
Cybercriminals using similar lexical styles when establishing domains to phish from allow analysts to spot them via natural language processing techniques.
The discovery of a flaw in Google Apps allowing cybercriminals to conduct email spoofing through the admin console may have some early adopters concerned.