“Google Admin” is an Android security app for Super Adminstrators of the Google for Work tools. But it had a security hole… Source: Sophos
“Google Admin” is an Android security app for Super Adminstrators of the Google for Work tools. But it had a security hole… Source: Sophos
The increasingly complex landscape that society’s mass digitization has established, driven by mobility and permanent connectivity, coupled with the new risks and threats that are proliferating in the market – which are becoming more and more sophisticated-, has created new challenges for the Chief Information Security Officer (CISO). Let’s see what they are here. The […]
Paying for a fast and reliable Wi-Fi connection at home only to find out that your neighbor is stealing the signal from you is pretty annoying. Not only is it frustrating, but there is also the legal aspect to think of – everything that is viewed and downloaded by the Wi-Fi connection is your responsibility. […]
Probably the quickest way for a security company to prompt an overwhelmingly hostile response from the security research community is to claim that its products and services are “unbreakable” by hackers. The second-fastest way to achieve that outcome is to have that statement come from an encryption company CEO who served several years in federal prison […]
The Internal Revenue Service (IRS) disclosed today that identity thieves abused a feature on the agency’s Web site to pull sensitive data on more than 330,000 potential victims as part of a scheme to file fraudulent tax refund requests. The new figure is far larger than the number of Americans the IRS said were potentially impacted when it […]
We can finally announce the winners of the 2016 Beta competition! The Betatester of the year, and winner of €600, is: Jayakrishnan P, from India Also, the 9 winners of €200 are: Anil Kumar E.S, from India Saravana Kumar S., from India Andreas Ntonas, from Greece S/o Ramakrishnan, from India HUANG JIN KAI, from Taiwan […]
The past few years have witnessed a rapid proliferation of cheap, Web-based services that troublemakers can hire to knock virtually any person or site offline for hours on end. Such services succeed partly because they’ve enabled users to pay for attacks with PayPal. But a collaborative effort by PayPal and security researchers has made it far more difficult for these services to […]
Lenovo has been caught red-handed again. Two years ago, the company was banned from supplying equipment for networks of intelligence and defense services in various countries as there were concerns with spying and hacking. Early this year, Lenovo was caught again for selling laptops pre-installed with Superfish malware. It looks like they have learnt […]
This is the latest must-have in mobile devices and the more its popularity increases, the more our confidential information is at risk – as they become more popular, smartwatches are now becoming the latest target for cybercriminals. At the end of the day, millions of users will store their personal data on these devices that […]