Top Story: Web attack! Everything you should know about malware on Facebook
We recently warned you about malware that is being deployed through Facebook Messenger. We know that the attack is launched through a Scalable Vector Graphic...
3 million Android phones vulnerable to attack
A newly discovered backdoor, part of a pre-installed rootkit, has rendered 3 million Android phones vulnerable to attack....
Hacker dishes advanced phishing kit to hook clever staff in 10 mins
Kiwicon Michele Orru has released an automated phishing toolkit to help penetration testers better exploit businesses. The well-known FortConsult hacker, better known as Antisnatchor (@antisnatchor),...
iPhone Security Bypass Spills Your Photos And Contacts
You’ve got a ton of very personal information on your phone. Text messages. Emails. Browsing history. Photos. The last thing you want is someone getting...
What Needs To Be Done To Make APIs More Secure
The presence of APIs to provide access and aid interconnectivity between websites is becoming increasingly commonplace. Furthermore, the use of APIs will continue to grow...
The advanced security techniques of criminal hackers
Staying secure online is an essential concern, for individual users, businesses, and cybercriminals alike. That’s right: Basic IT security applies whether you’re protecting sensitive data...
Ransomware stops here – preventing network-wide ransom attacks
Kasey Cross explains the devastation an organisation undergoes when struck by ransomware and describes preventative measures that can be taken to avoid spread from a...
A Life or Death Case of Identity Theft?
Identity thieves have perfected a scam in which they impersonate existing customers at retail mobile phone stores, pay a small cash deposit on pricey new phones,...