Top IT Security Bloggers

  • Fake Antivirus App Steals Contact Data on Mobile Devices

    Symantec Security Response Blogs

    The authors of Android.Enesoluty have added another app to their repertoire. The new app is called “Safe Virus Scan” in Japanese, and as the name suggests, it is supposed to function as an antivirus app.


    read more

  • Espionage Hackers Target ‘Watering Hole’ Sites

    Krebs on Security
    Security experts are accustomed to direct attacks, but some of today's more insidious incursions succeed in a roundabout way -- by planting malware at sites deemed most likely to be visited by the targets of interest. New research suggests these so-called "watering hole" tactics recently have been used as stepping stones to conduct espionage attacks against a host of targets across a variety of industries, including the defense, government, academia, financial services, healthcare and utilities sectors.
  • 25 Billion Cloud-Connected Devices to Come

    Trend Micro - Cloud Security Blog
    The International Telecommunications Union (ITU) has predicted that, in just eight years, there will be in upwards of 25 billion devices connected to the internet, which was announced in its annual The State of Broadband report. As a point of reference, the iPhone 5 broke the 5 million unit threshold in three days. To sell [...]
  • Should we worry about Donuts Inc.'s push for new domain names?

    CSO Online
    Fraud fighters say something stinks with Donuts Inc. and its campaign to introduce more domain names to the Internet.

    read more