Modern Listing Example

Android.Bankosy: All ears on voice call-based 2FA
Android.Bankosy gets updated to steal passwords sent through voice calls generated by 2FA systems. In…

Insurance losses from summer catastrophes pass half a billion dollars
Updated figures from the Insurance Council of Australia (ICA) show the combined cost of the…

Drone Labs Teams Up with FTG Security
FTG garners exclusive distribution rights for Drone Detector in the Northeastern U.S. Drone Labs has announced…

90% of industries have patient data breaches, says Verizon 2015 Protected Health Information Data Breach Report
Stolen medical information is a much more widespread issue than previously thought, affecting 18 out…

Ascending the Ranks: The Brazilian Cybercriminal Underground in 2015
The Brazilian underground’s emergence can largely be attributed to an environment where quick returns at…

Forcepoint brings fresh approach to safeguarding users, data and networks from insider and outsider threats
@ForcePointsec announced as the new security brand with integration of Raytheon cyber products, Websense and acquisition…

IDV Solutions announces ActivistMap.com extension for Visual Command Center
IDV Solutions has launched an extension with the Sigma Group’s ActivistMap.com that will help command…

Akamai Identifies SEO Web Application Attack Campaign
Attackers use SQL injections to manipulate search engine rankings, impacting an organisation’s revenue and reputation…