ALL POSTS Google Axed Android’s App Ops Armando Orozco December 20, 2013 0 Comments One feature that could set Android apart from other mobile operating systems is to deny permissions of individual apps. Doing so… Target US Stores Suffer Massive Data Breach UPDATED Joshua Cannell December 19, 2013 0 Comments Update:01/13 – Target CEO and President Gregg Steinhaffel confirmed in an interview with CNBC that the store’s PoS (point-of-sale) terminals were infected… Fake Tumblr Extension Harvests Tumblr Logins and More Christopher Boyd December 19, 2013 0 Comments If you’re a heavy user of Tumblr, you may well have run into their daily posting limit which based on the… Bug bounties and the price of security Adam Kujawa December 19, 2013 0 Comments In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could… Browser Ransomware hides behind CloudFlare, smartens payment system Jérôme Segura December 19, 2013 0 Comments We’ve covered the browser-based ransomware several times before on this blog, ever since it appeared back in July and again each… Another Day, Another PUP Joshua Cannell December 18, 2013 0 Comments Just when I thought I would be finished writing about PUPs for a bit, I came across a pop-up advising me… Amazon Invoice Malware Spam run Continues Christopher Boyd December 18, 2013 0 Comments I had a few mails land in a spamtrap of mine over the last few days, part of an ongoing spam… Temporary Tech? Permanent Fail Christopher Boyd December 17, 2013 0 Comments Not so long ago, I went up a mountain. A mountain which, you may be interested to know, sits roughly 5,000… Miner Madness! Adam Kujawa December 16, 2013 0 Comments Over the past few weeks, I am certain that you have heard your fair share about Bitcoin and not just from… Previous 1 … 582 583 584 585 586 … 614 Next Contributors Threat Center Podcast Glossary Scams