We get inside the tale of the iOS SideJacking app vulnerability that Apple knows about but hasn’t patched yet. Are you sitting comfortably? Then we’ll begin.
There are some handy hackers out there, no doubt; but hacking by hand is becoming an increasingly scarce commodity with the rise of automatic cybercrime.
Forgotten your password? A new form of biometric authentication technology is looking into using your skull, and not fingerprints, to log you in.
According to the Women’s Society of Cyberjutsu only 11 per cent of those working in the cybersecurity industry worldwide are women. That is, frankly, a shocking statistic.
In the Poseidon Adventure movie, passengers aboard a cruise ship struggle to survive after a tidal wave strikes. Those enterprises hit by the Poseidon APT Group must know how that feels.
If you want to get a real-world handle on how the cybersecurity threatscape is being shaped, and therefore understand both threat evolution patterns and the best methods to mitigate against the resulting attacks, quarterly research reports are your best bet.
University of Cambridge researchers found, “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.”
Last year security vendor AVG researchers discovered that a popular banking Trojan, a Vawtrak variant, was using steganography as a method of obfuscating update files.
Just as malware is malicious software, so we have malvertising, which is malicious advertising. Unlike malware though, malvertising can literally eat away at your revenue stream if you are an online content provider.
The Google Nexus 6P has finally started shipping in the UK, and here at IT Security Thing we have got our hands on one to do a Google Nexus 6P security teardown.
The XCodeGhost iOS threat is back, and this time it’s serious; seriously stealthy. Oh, and it’s also no longer largely a Chinese problem. IT Security Thing investigates.
DDoS mitigation experts CloudFlare has revealed that when it comes to the attack surface, theory has once again turned into reality with an attack by Chinese smartphones.
What if you could just walk up to an ATM machine and rob the bank right there? What if you also used two factor authentication to stop other robbers doing the same? That’s what Proofpoint researchers have discovered is happening with GreenDispenser ATM malware.
Researchers from the University of Illinois have published a paper entitled MoLe: Motion Leaks through Smartwatch Sensors, which, if you believed everything you read online, might lead you to think that your smartwatch is at risk to hackers.
Could old hardware be weakening your security posture? New research regarding a design flaw in pre-Sandy Bridge Intel processor architecture provides plenty of food for secure thought.