Please turn on your JavaScript for this page to function normally.
password
Ad targeters exploit browsers’ password managers to track users online

Ad targeters are exploiting browsers’ built-in login managers to covertly collect hashes of users’ email addresses, to be used to track them across the web. …

Intel inside
Upcoming patches for security flaw in Intel processors expected to slow down computers

Windows users whose PCs run on Intel processors can apparently expect their computers to slow down after next Tuesday. In fact, all computers using modern Intel chips – …

Google Chrome
How to keep your browser and devices safe from cryptojackers

Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …

password
Make 2018 your year of taking password security more seriously

The popularity of passwords as a means of authentication is still not waning, so advice on how to opt for passwords that are hard to guess and crack is always timely. Choosing …

Absolute dashboard
Let no endpoint go dark

The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …

industry
Attackers disrupt plant operations with ICS-tailored malware

Security researchers from FireEye and Dragos have analyzed and detailed a new piece of malware targeting industrial control systems (ICS). Dubbed “TRITON” and …

Fox IT
Security company Fox-IT reveals, details MitM attack they suffered in September

Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …

Hacking Team
US man is behind the 2015 Hacking Team hack?

Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the …

face
1.4 billion unencrypted credentials found in interactive database on the dark web

A data dump containing over 1.4 billion email addresses and clear text credentials  is offered for download in an underground community forum. What’s so special about …

Hands
MoneyTaker’s stealthy hacking spree spread from US to Russia

A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation …

HP laptops
Keylogger found in Synaptics driver on HP laptops

For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. The first time was earlier this year, when Swiss …

Android
Android vulnerability allows attackers to modify apps without affecting their signatures

Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures. The danger …

Don't miss

Cybersecurity news