All Blogs / Technology / Security / Popular

Sex Sells: Looking at Android Adult Adware Apps

Advertising is one of the primary methods to generate money from mobile devices. Ads can be displayed in the browser when you visit a specific website or can appear in free apps. In the case of mobile apps, the developer must select a theme that attracts many users to increase revenues. Show More Summary

4 Ways to Protect Against the Very Real Threat of Ransomware

Ransomware is a hacking plague that knows no limits. Here's how to protect yourself and your business. The post 4 Ways to Protect Against the Very Real Threat of Ransomware appeared first on WIRED.

Severe 7-Zip vulnerabilities cause top security, software tools patch panic

The open-source file archiver's security flaws have ramifications which go all the way up to the top.

OkCupid user account data released for the titillation of the Internet

Can researchers unmask the identities of OkCupid users through their usernames, sexual preferences and turn-ons?

We Said We’d Be Transparent … WIRED’s First Big HTTPS Snag

Today WIRED is acknowledging a delay in our HTTPS rollout—but we've got good news too. The post We Said We'd Be Transparent … WIRED's First Big HTTPS Snag appeared first on WIRED.

Key Lessons From Verizon’s ‘2016 Data Breach Investigations Report’

The annual Data Breach Investigations Report (DBIR) is out and reinforces the value of well-established cybersecurity practices. The good folks at Verizon have once again published one of the most respected annual reports in the security industry. Show More Summary

Server-Side Request Forgery Takes Advantage of Vulnerable App Servers

Server-side request forgery is an attack in which an attacker can force a vulnerable server to trigger malicious requests to third-party servers and or to internal resources. This vulnerability can then be leveraged to launch specific attacks such as a cross-site port attack, service enumeration, and various other attacks. Show More Summary

Adobe releases Flash update to fix critical security flaws

Hackers are actively exploiting the Flash security flaw to hijack computers.

Mozilla wants feds to turn over Firefox hack used to catch sex offender

In a court filing, the browser maker said the government should not sit on a vulnerability that threatens millions of users.

The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare

Hacker Maksym Popov gave himself up to the FBI and joined its fight against Eastern European cybercrime. Trouble is, he never really gave up his black hat. The post The Ukrainian Hacker Who Became the FBI's Best Weapon—And Worst Nightmare appeared first on WIRED.

Homeland Security warns of hackers exploiting SAP security flaw

At least 36 organizations are affected by outdated or misconfigured software.

Hacker Lexicon: SQL Injections, an Everyday Hacker’s Favorite Attack

SQL injection attacks are the workhorses of hacking incidents, tricking web sites into spilling credit card numbers and other sensitive data to hackers. The post Hacker Lexicon: SQL Injections, an Everyday Hacker's Favorite Attack appeared first on WIRED.

Why Yahoo Mail is now blacklisted by Congress

The House of Representatives is not best pleased with the email provider.

This $70 wireless gateway now blocks ads for anyone who connects to it

The gateway plugs in to your home router and blocks potentially dangerous ads on the fly to every user connecting to it.

How to Check Which Apps Access Your Tweets—And Stop Them

If you’d rather keep your weird Twitter habits close to the vest, you’ll be happy to know that the social media giant keeps you in the loop. The post How to Check Which Apps Access Your Tweets—And Stop Them appeared first on WIRED.

All versions of Windows hit by "critical" security vulnerabilities

It's the fourth patch ?so far this year that's hit all versions of Windows.

Copyright © 2015 Regator, LLC