Attackers can replace legitimate apps with fake ones that access and steal personal information
The group infects the network access Web portals used by hotels and business centers to target specific guests
The project doesn't have funding as yet to improve the security of hidden websites
The company has received requests for .onion SSL certificates after issuing one to Facebook
Marketing hype or the limits of SSL inspection?
The company advised that people stick to trusted sources for downloading apps
Data packets used by wireless access points to advertise their capabilities can be used to control malware running on nearby computers
The flaws allow attackers to execute commands, overwrite files and launch CSRF attacks
Regulator is losing patience ....
Macro attacks fell out of favor years ago but are coming back, Trend Micro said
Chinese 'hotel crew' pwns networks for state surveillance
Could Microsoft, Apple or Google do this? Negative.
Tor users are neither 'invisible nor untouchable,' official says
Researchers find Windows applications designed to infect iOS devices with an older WireLurker malware variant
Jordan Lee Jones was sentenced to 12 months probation on hacking-related charges
The malware is using new methods to target Apple users, but should you be worried?
The 26-year-old was arrested Wednesday in San Francisco and faces multiple charges in New York
The FBI this week said it had nabbed one of the agency's Cyber's Most Wanted outlaws -- John Gordon Baden – who is charged with stealing the identities of 40,000 people and then using the information to siphon millions of dollars from brokerage...
Thousands of users may be infected with malware that collects data from an iOS device, Palo Alto Networks said
IBM's new Dynamic Cloud Security offers a set of services covering access control, data protection and increased visibility