Please turn on your JavaScript for this page to function normally.
Intel processor
Intel chips riddled with deadly flaws

As we’re waiting for security researchers to detail the Intel Management Engine vulnerability that can allow attackers to run undetectable, unsigned code on machines …

Sacramento Regional Transit Bus
Hackers hit Sacramento transit system, demand money to stop attack

Hackers looking for a payout have hit the Sacramento Regional Transit (SacRT) system, defacing the agency website, erasing data from some of its servers, and demanding money …

tech support scam
New scam launches users’ default phone app, points it to fake tech support hotline

The latest variants of tech support scams targeting Apple users have done away with the usual visually prominent error messages. Instead, they open the potential …

Facepalm
Sites using session replay scripts leak sensitive user data

When we enter sensitive information – our names, passwords, payment card information, medical information, what have you – into websites, we do it with the …

alert
GitHub starts alerting developers of security vulnerabilities in dependencies

Popular Git repository hosting service GitHub has introduced a new feature to help developers keep their projects safer: security alerts for vulnerabilities in software …

kids smartwatch
German government bans children’s smartwatches, tells parents to destroy them

The Federal Network Agency (Bundesnetzagentur), Germany’s regulatory agency for public utility companies, has categorized children’s smartwatches as spying …

Cisco
Critical flaw in Cisco collaboration products plugged

A critical vulnerability in a dozen Cisco collaboration products based on the Cisco Voice Operating System (VOS) could allow unauthenticated, remote attackers to gain access …

Google Play
Sneaky malware downloader found in apps on Google Play

Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages – a mixture of Android cleaners and …

Bug
What motivates bug hunters?

Crowdsourced security penetration testing outfit Bugcrowd has released its second annual “Mind of a Hacker” report, to provide insight into bug hunters’ …

How to stop Emotet malware from infecting your computer

The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware. Latest …

Firefox tracking protection
Firefox Quantum: Security and privacy improvements

Mozilla has released Firefox 57, aka Firefox Quantum, and it comes with many performance improvements. It sports a new browsing engine that takes full advantage of the …

iPhone 8
The tools criminals use to prepare a stolen iPhone for resale

Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …

Don't miss

Cybersecurity news