Please turn on your JavaScript for this page to function normally.
alert
DHS, FBI warn about malware tied to North Korean threat actor

US-CERT has released a new technical alert on malware used by Hidden Cobra, a threat actor whose activities they believe to be directed by the North Korean government. The …

Trojan
BackSwap Trojan exploits standard browser features to empty bank accounts

Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in …

Facebook 2FA
Facebook now supports 2FA via authenticator apps

Facebook has good news for users who wish to secure their accounts with two-factor authentication but aren’t comfortable sharing their phone number with the social …

Microsoft
Microsoft will extend GDPR rights to customers worldwide

Microsoft has announced it will extend the rights that are at the heart of GDPR to all of their consumer customers worldwide. “Known as Data Subject Rights, they include …

Apple
European users can request a copy of the data Apple keeps on them

Apple has set up a Data and Privacy portal where users can make a request to download all the data Apple has on them, correct their personal information, deactivate or delete …

world
VPNFilter malware compromises over 500,000 networking devices around the world

Cisco Talos researchers have flagged a huge botnet of small and home office routers and NAS devices, capable of collecting communications and data and launching cyber attacks. …

Eyes
How a URL shortener allows malicious actors to hijack visitors’ CPU power

URL shorteners are often used by malware peddlers and attackers to trick users into following a link they otherwise wouldn’t. But Coinhive’s URL shortener carries …

BMW
Researchers hack BMW cars, discover 14 vulnerabilities

Keen Security Lab researchers have discovered fourteen vulnerabilities affecting a variety of BMW car models. The flaws could be exploited to gain local and remote access to …

Intel inside
New Spectre-like flaw found in CPUs using speculative execution

A new flaw that can allow an attacker to obtain access to sensitive information on affected systems has been discovered in modern CPUs. CVE-2018-3639, discovered by …

fish phishing
Certain types of content make for irresistible phishes

A mature anti-phishing program keeps organizations safer, claims Cofense, and offers as proof the decreasing susceptibility of their customers’ employees to mock …

editor
The percentage of open source code in proprietary apps is rising

The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging …

Fortnite
Fortnite is coming to Android, but malicious fake apps are already there

Android users eager to play the increasingly popular Fortnite survival game on their mobile devices are being targeted left and right with malicious apps masquerading as the …

Don't miss

Cybersecurity news