Banking Trojan returns to Google Play

A dangerous Android banking trojan that was first reported by ESET earlier this year has found its way to Google Play, now stealthier than ever. Dubbed BankBot, the banking trojan has been evolving throughout the year, resurfacing in different versions on and outside...

Ideco launches ‘foolproof’ identity verification

Ideco has unveiled its next generation identity assurance ecosystem, designed to deliver what is describes as fraud-proof trusted identity authentication, confirmed with a digital certificate of authenticity in seconds. Ideco’s new Identity-as-a-Service (IDaaS)...

Security in an increasingly connected world

The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices – cars, toys, medical devices, home appliances – and all these smart things connecting to the Web have to be secured. Unfortunately, security...

BlueBorne may affect billions of devicesĀ 

Fortinet urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack.While there is no evidence that such attack vectors...

Strengthening the human weakness

Insider threats are one of the trickiest threats to detect and fight effectively, and are a top concern for businesses of all types, particularly those that house sensitive customer data. Insider threats are even more dangerous, because unlike hackers, they...

Mobile network security calls for new services

It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which highlights the many challenges businesses face as they look to curb an increasing number of attacks passing through their IT networks. In the telecom...