August 3, 2016 WPAD Leaks Could Mean Flood of URL Trouble 2 min read - WPAD is an easy way to grab proxy information and get browsers online. When it comes to security, however, this protocol doesn't make the grade.
August 2, 2016 Flaws Found: Social Side of Black Hat App Goes Dark 2 min read - The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.
August 2, 2016 Typing Predictions of SwiftKey May Have Leaked Users’ Emails 2 min read - The SwiftKey mobile app's typing prediction feature has been generating unfamiliar phrases, emails and passwords belonging to other users.
August 2, 2016 Cloud File Storage Can Be a Shadow Threat 2 min read - The latest edition of the Shadow Data Report found that most cloud file storage apps fail to achieve compliance with SOC 2 and GDPR.
August 1, 2016 Mega Malvertising Campaign Hits Millions Per Day, Hides in Plain Sight 2 min read - Security firms discovered a malvertising campaign known as AdGholas that hides in plain sight and targets more than 1 million users each day.
August 1, 2016 New SMS Phishing Campaigns Spotted: Attackers Bobbing for Apples? 2 min read - The latest targets of SMS phishing are iOS users. In fact, more than 7,500 users who clicked on a malicious link fell victim to a recent smishing attack.
August 1, 2016 Mobile Security News Roundup: Top Stories From July 2 min read - It has been an eventful July for mobile security, with news regarding "Pokemon Go," smartwatches, IBM MaaS360's ISO 27001 certification and more.
July 28, 2016 Petya and Mischa Go RaaS 2 min read - The developers of the Petya and Mischa ransomware packages have embraced a new business model: ransomware-as-a-service (RaaS).
July 28, 2016 SMS Two-Factor Authentication: Time to Trash the Text? 2 min read - Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
July 28, 2016 Wireless Keyboard Security May Be a Mirage 2 min read - According to Bastille Research, there is no such thing as wireless keyboard security. Users should use Bluetooth or wired keyboards to prevent attacks.