Wednesday, December 12, 2018

Tackling ads abuse in apps and SDKs

Posted by Dave Kleidermacher,...

Bring Out the Cake! CQURE Celebrates Ten Years!

Back when we first started technology was much simpler and things like network spoofing were major security threats. Since then our CEO and founder Paula Januszkiewicz has scooped numerous awards...

7 Yr Old with $22 Million

​Achieving fame and wealth on YouTube is no easy feat — most creators toil for years, only gain hundreds or a few thousand followers (Hackology is one example) and earn...

DarkVishnya: Banks attacked through direct connection to local network

While novice attackers, imitating the protagonists of the U.S. drama Mr. Robot, leave USB flash drives lying around parking lots in the hope that an employee from the target company...

Nokia: IoT Botnets Comprise 78% of Malware on Networks

Nokia is warning of a deluge of IoT malware after revealing a 45% increase in IoT botnet activity on service provider networks since 2016. The mobile networking firm’s Threat Intelligence Report...

Paula takes ‘Dear Hacker’ on Microsoft Ignite | The Tour

Today at Messe Berlin as part of MS Ignite on Tour, Paula delivered a shortened version of the ‘Dear Hacker’ workshop which won her praise at this year’s main Ignite...

Evidence in Marriott’s subsidiary Starwood hack points out to China intelSecurity Affairs

According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to the Reuters, people...

Can Cognitive Tools Succeed Where Humans Have Failed?

“Human analysis is very limited. We quickly get overwhelmed,” says Leyla Bilge, a member of the Symantec Research Labs whose team studies the future use of artificial intelligence in blocking...

Best antivirus software: 14 top tools

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only six of the 18 products tested earned a...

Smashing Security #107: Sextorting the US army, and a Touch ID scam

Fitness apps exploit TouchID through a sneaky user interface trick, tech giants claim to have a plan to banish passwords, and you won’t believe who was behind a sextortion scam...

LATEST NEWS

MUST READ