20% of all malware ever created appeared in 2013

Wednesday, March 19th, 2014

According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day. Despite Trojans have continued to ...

United States to give up its oversight on domain name assignment

Sunday, March 16th, 2014

In the wake of an NSA spying scandal which has shaken the faith of many in the United States' dedication to digital privacy, the U.S government has announced that it will be ceding its oversight of ICANN - the organization which manages domain name assignment for every site on the internet. According ...

All major browsers fall during second day at Pwn2Own hacking contest

Friday, March 14th, 2014

Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000. A team from French vulnerability research firm Vupen hacked Google Chrome by exploiting a use-after-free vulnerability ...

Major security flaw threatens Linux users

Wednesday, March 5th, 2014

A source code mistake in the GnuTLS library an open-source software building block used in a large number of different Linux distributions to handle secure Internet connections could prove a serious threat to the privacy of Linux users, as developers rush to patch the vulnerability. Nikos Mavrogiannopolous, the developer of GnuTLS, ...

Apple security flaw could allow hackers to beat encryption

Saturday, February 22nd, 2014

A major flaw in Apple Inc software for mobile devices could allow hackers to intercept email and other communications that are meant to be encrypted, the company said on Friday, and experts said Mac computers were even more exposed. If attackers have access to a mobile user's network, such as by ...