A fake CloudFlare DDoS (distributed denial of service) check page is being used by a Nuclear exploit kit (EK) gate to load a malicious redirection page to serve malware, according to security firm Malwarebytes. [Read More]
In its 2015 Global Threat Report, security researchers at CrowdStrike examine the main trends in the threat landscape in 2015, including the evolution of Trojans, ransomware, phishing emails, and other threats. [Read More]
A group of former and current students have sued Google in federal court in San Jose, California, alleging that the company scanned their Gmail accounts and gathered data for advertising purposes. [Read More]
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
In the initial hours after the Paris attacks by Islamic terrorists, when the PlayStation 4 rumor was first circulating, I decided to see exactly what kind of encryption the PS4 uses for its messaging system.
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.