An anonymous reader quotes a report from The Verge: A recent patent application (PDF) shows…
iOS WebView Problem Allows Attackers to Initiate Phone Calls
An issue in iOS WebView that is trivial to exploit can give an attacker the…
Google to Red Flag ‘Repeat Offender’ Websites
Google’s Safe Browsing program expands to include “Repeat Offender” websites in blacklisting program.
Locky Targets OPM Breach Victims
A phishing campaign is targeting some of the 22 million victims of the massive United…
CEO Fraud
CEO Fraud is a type of targeted attack. It commonly involves a cyber criminally pretending…
Unique Passwords
Make sure each of your accounts has a separate, unique password. Can’t remember all of…
Don't Lose That Device
Did you know that according to the Verizon DBIR team, you are 16 times more…
Use Caution Opening Email Attachments
A common method cyber criminals use to hack into people’s computers is to send them…
Who needs a Stingray when Wi-Fi can do the job?
Ordinary Wi-Fi hotspots can be used to extract indentifiers from your cellphone, researchers have found
Microsoft to shield world chess champion from Russian hackers
Leading up to Friday’s world championship, he asked for help in keeping months of computer-intensive…