Salesforce acquires mobile authentication firm Toopher
Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.
John Ribeiro | 02 Apr | Read more
Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.
John Ribeiro | 02 Apr | Read more
The number of distributed denial of service attacks using anonymous proxies has increased dramatically over the past year, according to a new research report, as attackers use these proxies to create an instant pseudo-botnet.
Maria Korolov | 01 Apr | Read more
Over the last few days, a large number of British Airways customers have found that reward points they accumulated for flights, called Avios, have disappeared from their accounts. Others have been locked out of their accounts completely.
Lucian Constantin | 30 Mar | Read more
Some Internet gateway devices commonly used by hotels and conference centers can easily be compromised by hackers, allowing them to launch a variety of attacks against guests accessing the Wi-Fi networks.
Lucian Constantin | 27 Mar | Read more
Cisco Systems released firmware updates for several routers and switches that run its IOS and IOS XE software in order to fix flaws in their autonomic networking infrastructure (ANI) feature.
Lucian Constantin | 26 Mar | Read more
This app could save your older Android phone from being hijacked. Specifically, the Installer Hijacking Scanner app from the Google Play store is designed to check for a vulnerability that was discovered over a year ago and still hasn't been resolved.
Tony Bradley | 26 Mar | Read more
Security researchers from Tel-Aviv-based enSilo are congratulating anti-virus vendor AVG Technologies for its fast response to a security flaw in one of its programs.
Maria Korolov | 26 Mar | Read more
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.
Lucian Constantin | 25 Mar | Read more
Flash files that are vulnerable to a serious flaw patched by Adobe Systems over three years ago still exist on many websites, exposing users to potential attacks.
Lucian Constantin | 25 Mar | Read more
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
Lucian Constantin | 23 Mar | Read more
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
Lucian Constantin | 20 Mar | Read more
Companies looking to protect their Web applications from SQL injection attacks typically install a firewall in learning mode and train it to recognize attacks. It's not a perfect solution, but it's been the best available.
Maria Korolov | 19 Mar | Read more
In an effort to simplify authentication for its services, Yahoo has introduced a new mechanism that allows users to log in with temporary passwords that are sent to their mobile phones.
Lucian Constantin | 17 Mar | Read more
BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.
Peter Sayer | 15 Mar | Read more
Over a million WordPress websites that use a popular plug-in to optimize their search engine results are at risk of being hacked if they don't apply a newly released patch.
Lucian Constantin | 13 Mar | Read more