Please turn on your JavaScript for this page to function normally.
iOS 11
Apple’s intermittent password prompts prime iOS users for phishing

By asking iOS users to enter their AppleID password intermittently and with no regard of environment, Apple has laid the groundwork for phishers to go after the sought-after …

Network
Investigation reveals large botnet hiding behind Fast Flux technique

Fast Flux, a DNS technique first introduced in 2006 and widely associated with the Storm Worm malware variants, can be used by botnets to hide various types of malicious …

Australia
Hackers go after Australian ICT, managed services providers

The Australian Cyber Security Centre (ACSC), which integrates the national security cyber capabilities and serves as a hub for collaboration and information sharing with the …

Windows
Bugs in Windows DNS client open millions of users to attack

In this month’s Patch Tuesday, Microsoft has included fixes for multiple critical memory corruption vulnerabilities in the Windows DNS client, which could be exploited …

Accenture
Accenture inadvertently exposes highly sensitive corporate, client data online

Corporate consulting giant Accenture left bucketloads of sensitive corporate and client data exposed online for anyone to access. Luckily for them, it seems that UpGuard …

earth
Inside the Middle Eastern and North African cybercriminal underground

Trend Micro researchers investigated the Middle Eastern and North African cybercriminal underground, and found that prices for malware and hacking tools are generally a bit …

biohazard
Defense contractors, manufacturers targeted with malware-as-a-service infostealer

Information stealing FormBook malware is being lobbed at defense contractors, manufacturers and firms in the aerospace sector in the US and South Korea. Delivery methods The …

professional
Do board members treat cybersecurity as a top priority?

Despite high profile cyberattacks continuing to occur, almost half of IT decision makers (ITDMs) at 250+ employee organizations around the world still believe that business …

question
Alleged cyberstalker unmasked by VPN logs

A Massachusetts man was arrested on cyberstalking charges after the online activities he tried to hide through VPN use were revealed by logs provided by PureVPN. “It is …

bitcoin
Hackers use organizations’ resources for stealthy cryptocurrency mining

Hackers lusting after cryptocurrency but not wanting to spend money to buy it or mine it are targeting users wallets, computers, popular Web sites and public cloud computing …

PC
Patching discrepancy between supported Windows versions puts users at risk

Security improvements should be a welcome addition to all software, but if they are not also simultaneously backported into its older and still supported versions, they can …

files
Disqus, Forrester Research suffer data breach

Popular blog comment hosting service Disqus and market research company Forrester Research announced late on Friday that they’ve suffered a breach. While the latter was …

Don't miss

Cybersecurity news