December 8, 2016 Enforcement of iOS’s App Transport Security Is Problematic 2 min read - Despite Apple's plans to begin enforcing its App Transport Security standard at the start of 2017, many iOS app developers are still dragging their feet.
December 8, 2016 Malvertising Poisons Banner Ads 2 min read - A recently discovered malvertising campaign known as Stegano uses steganography and other techniques that researchers have observed in similar attacks.
December 6, 2016 Distributed Guessing Attack: Credit Crooks Now Crowdsourcing Crendential Compromise 3 min read - A team of researchers demonstrated a new distributed guessing attack that can enable cybercriminals to ferret out credit data and other login credentials.
December 6, 2016 Global Cybersecurity Survey Shows Confidence Drop 2 min read - According to a recent cybersecurity survey, companies are losing confidence in their ability to assess security risks and mitigate threats.
December 6, 2016 Mobile Security News Roundup: Top Stories From November 2 min read - November's mobile security news roundup covers iCloud insecurity, holiday shopping hazards, Android issues involving plugin Trojans and ad fraud malware.
December 5, 2016 Restricting Recon: SAMRi10 Tool Targets Shifty Cyber Spies 2 min read - Cybercriminals have moved beyond brute force and are now conducting recon on corporate networks. New tool SAMRi10 may help restrict their cyber spying.
December 5, 2016 Wake-Up Call: Millions of Android Users at Risk of MitM Attacks 2 min read - Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.
December 5, 2016 A Software Attempt to Mitigate Rowhammer Attacks 2 min read - German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).
December 2, 2016 Three Ways to Become More Cyber Resilient: Findings From Ponemon’s New Study 2 min read - Findings from the Ponemon Institute's "2016 Cyber Resilient Organization" study suggest that many organizations are unprepared to respond to a cyberattack.
December 1, 2016 Browser Malware Skunks Tor 2 min read - Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.