DARPA makes finding software vulnerabilities fun
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work. read more more…Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from small devices that fit into our hands. People from across the globe can reach out to each other with one message. You can buy a plane ticket while on the bus. There are apps that […] more…Facebook Spam Leverages, Abuses Instagram App
The downside of popularity is that cybercriminals tend to abuse it for their own nefarious ends. Case in point, social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged […] more…More information
- Woman killed by man she met through Facebook
- 200,000 Harbin Clinic Patients Impacted by NRS Data Breach
- Facebook bug bounty program paid out $1.5m in 2013
- NASA refutes Iranian cyberattack claims
- Resolved: ITS Wireless 1.0 Service Disruption
- Stolen details of 3.3m Hello Kitty fans – including kids – published online
- Accellion Reaches $8.1 Million Settlement Over FTA Data Breach
- New Mirai Variant Targets Vulnerability in Comtrend Routers
- Android Worm on Chinese Valentine’s day
- CIOs plan to increase cloud spending