ALL POSTS Hard times on The Moscow Times Jérôme Segura January 7, 2014 0 Comments The Moscow Times, ‘Russia’s only daily newspaper in English’, has been a popular source of information for expatriates since it started… Life is a breach, and then you’re pwned Jean Taggart January 6, 2014 0 Comments The continuous flow of high-profile data breaches are a problem for anyone wishing to stay secure. Every time I hear about… Steer Clear of These “Free £250 ASOS Gift Voucher” Sites Christopher Boyd January 2, 2014 0 Comments What is it? The latest in a run of sites claiming to offer vouchers for well-known brands, this time focusing on… Taken down by the ‘DERP’ Joshua Cannell December 31, 2013 0 Comments An unknown hacker, who goes by the name of ‘DERP’, recent began targeting many popular video-game websites with Distributed Denial of… Give a Doge a Coin Adam Kujawa December 31, 2013 0 Comments Well, it’s happened. The internet is just a few steps away from becoming a sentient being, given life and value by… Vulnerability Found in Samsung’s Galaxy S4 Armando Orozco December 27, 2013 0 Comments Researchers from Ben-Gurion University’s security lab (BGU) discovered a vulnerability in the Samsung Galaxy S4’s Knox architecture. If exploited, the attacker… Typo Trouble in Bitcoin Land Christopher Boyd December 24, 2013 0 Comments Mt. Gox, the “World’s Largest Bitcoin exchange” might be where you want to go if you’re dabbling in Bitcoin.However, there are… A Tumblr of trouble Jérôme Segura December 24, 2013 0 Comments Like many other social networking sites, Tumblr is a hot spot for malware infections, spam and other security issues.I thought this… Google Axed Android’s App Ops Armando Orozco December 20, 2013 0 Comments One feature that could set Android apart from other mobile operating systems is to deny permissions of individual apps. Doing so… Previous 1 … 584 585 586 587 588 … 617 Next Contributors Threat Center Podcast Glossary Scams