Google Confirms Android Smartphone Security Backdoor

Google Confirms Android Smartphone Security Backdoor

Earlier this year, Forbes reported how a banking Trojan called Triada had been found on a bunch of brand new budget Android smartphones. Google has now confirmed…

View More Google Confirms Android Smartphone Security Backdoor
Sextortion Scammers Pose as Corrupt CIA Agents

Sextortion Scammers Pose as Corrupt CIA Agents

In a new sextortion scam, cyber-criminals are posing as corrupt officials of the CIA and demanding $10,000 from their targets whose names they claim to…

View More Sextortion Scammers Pose as Corrupt CIA Agents
For two hours, a large chunk of European mobile traffic was rerouted through China

For two hours, a large chunk of European mobile traffic was rerouted through China

For more than two hours on Thursday, June 6, a large chunk of European mobile traffic was rerouted through the infrastructure of China Telecom, China’s…

View More For two hours, a large chunk of European mobile traffic was rerouted through China
12k+ Android apps contain master passwords, secret access keys, secret commands

12k+ Android apps contain master passwords, secret access keys, secret commands

A comprehensive academic study published this week has discovered hidden backdoor-like behavior — such as secret access keys, master passwords, and secret commands — in…

View More 12k+ Android apps contain master passwords, secret access keys, secret commands
5 reasons why you should use a password manager

5 reasons why you should use a password manager

This should go without saying. Unfortunately, it does need to repeat over and over. You need to use a password manager. Why? Let me cut…

View More 5 reasons why you should use a password manager
Dark Web Becomes a Haven for Targeted Hits

Dark Web Becomes a Haven for Targeted Hits

Malware on the Dark Web is increasingly being customized to target specific organizations and executives. Malicious services offered on the Dark Web are more like…

View More Dark Web Becomes a Haven for Targeted Hits
6 questions to consider before implementing a disaster recovery plan

6 questions to consider before implementing a disaster recovery plan

DRP’s are about backing up data and recovering from loss as efficiently as possible, but a plan is only as good as its weakest link.…

View More 6 questions to consider before implementing a disaster recovery plan
Report: Facebook to Announce Cryptocurrency Project This Month

Report: Facebook to Announce Cryptocurrency Project This Month

Social media giant Facebook will reportedly announce its cryptocurrency project this month, allowing employees to take part of their salary in the coin, CNBC reports…

View More Report: Facebook to Announce Cryptocurrency Project This Month
New RCE vulnerability impacts nearly half of the internet's email servers

New RCE vulnerability impacts nearly half of the internet’s email servers

A critical remote command execution (RCE) security flaw impacts over half of the Internet’s email servers, security researchers from have revealed today. The vulnerability affects…

View More New RCE vulnerability impacts nearly half of the internet’s email servers
Vietnam Rises as Cyberthreat

Vietnam Rises as Cyberthreat

The country’s rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity. Vietnam has rarely been associated with cybercrime…

View More Vietnam Rises as Cyberthreat