Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken and non-jailbroken devices.
Security experts at Cisco Talos have discovered a new strain of the Fareit Info stealer that uses a different File hash for each attack to avoid AV Detection
FOR HACKERS LOOKING for fraud victims, few targets are as tempting as the data brokers that make a business out of assembling millions of people's private information. That's a lesson T-Mobile is learning now that its partnership with one such data collector, Experian, has resulted in the theft of 15 million T-Mobile customers' private details.
Half a decade into the cloud-first initiative, adoption in the federal government continues to be way behind schedule mostly due to security concerns. Vendors argue that those concerns are exaggerated.
Here's what popular services like Apple, Google, Facebook, and Microsoft collect -- and what you can do about it.
When British spies gave their Internet surveillance program the codename Karma Police they may have given away a little too much about its epic purpose: "To build a web-browsing profile for every visible user on the Internet."
Being a DJ seems like a pretty awesome gig if you can get it. A small handful of DJs manage to elevate themselves from the masses to achieve global superstar status—and the attention of malware developers. Just ask Armin van Buuren. He tops the 9th annual Intel Security Most Dangerous Celebrities list.