Why Kids Use Secret Decoy Apps and Why Parents Should Care
Kids have been locking their diaries and hiding top secret shoe boxes since Sandy Olssen had a crush on Danny Zuko. The need for more and more privacy is a natural part of growing up. Today, however, some kids hide their private lives behind locked decoy apps catapulting those harmless secret crushes to a whole […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…More information
- Unofficial Patch Released for Recently Disclosed Internet Explorer Zero-Day
- At WWDC, Apple hones in on device management
- Australian Human Rights Commission Discloses Data Breach
- US Government Details Tools Used by APTs in Defense Organization Attack
- WannaCry One Year Later: Looking Back at a Milestone
- Student who hacked college website escapes jail time, gets job offers
- US Recovers $15 Million From Ad Fraud Group
- Media Production Giant Banijay Hit by Ransomware
- Linux kernel flaw endangers millions of PCs, servers and Android devices
- DoD Launches "Hack the Air Force" Bug Bounty Program