Access certification
Access certification describes the independent review of access rights by an auditor.
The auditor examines whether the rights granted to users are really necessary.
Voice over WiFi (VoWiFi) mobile radio protocol or WLAN calling
CISPA researcher Adrian Dabrowski, together with colleagues from SBA Research and the University of Vienna, has uncovered two far-reaching security vulnerabilities in the mobile phone protocol Voice over WiFi (VoWiFi), also known as WLAN calling.
Over 105,000 malware samples detected
Zimperium, a security expert in real-time protection for mobile devices, has discovered a new and potent threat identified as SMS Stealer.
Zimperium’s zLabs team uncovered the malware during routine analysis and has now detected it in over 105,000 malware samples from more than 600 global brands.
Upscale Sales!
Find out how companies can use CIAM and customer journey analyses to optimize their sales strategies and better activate existing customers.
Biggest-ever leak of digital pirates
The Cybernews research team discovered an unprotected database containing the data of almost 10 million users.
The database belongs to an attacker called Z-lib, which operates a malicious clone of Z-Library.
Security, efficiency and user experience
CyberArk, the identity security company, has unveiled enhancements to its CyberArk Identity Security Platform.
Password free
Statement: Red Teaming
At a time when security incidents are increasing exponentially and the threat landscape is becoming ever more complex, companies are faced with the huge challenge of effectively protecting their sensitive data and systems.
PDF Pro and Help PDF
Many people use free online services to create PDFs quickly and easily.
A recent study by the Cybernews research team reveals that this convenience can come at a high price: the security of personal data.
Most Read Articles
31. March 2026
30. March 2026
19. March 2026