Please turn on your JavaScript for this page to function normally.
authentication
Attackers exploited SS7 flaws to empty Germans’ bank accounts

Cyber criminals have started exploiting a long-known security vulnerabilities in the SS7 protocols to bypass German banks’ two-factor authentication and drain their …

industrial robot
Hacking industrial robots in today’s smart factories

It has been estimated that by 2018, approximately 1.3 million industrial robot units – mechanical multi-axis “arms” used for automating various operations – will …

mobile
More and more apps equipped with ultrasonic tracking capability

Researchers have found 234 Android applications that are constantly listening for ultrasonic beacons in the background, allowing companies to track users’ current …

Android malware
Super Free Music Player is the latest malware on Google Play

Another day, another piece of malware lurking on Google Play, masquerading as a free and helpful app. This time it’s called “Super Free Music Player” and is …

Retina-X admits they have suffered a data breach

Retina-X Studios, the makers of several consumer-grade monitoring products, have finally announced that they have suffered a data breach. Retina-X and FlexiSpy, another …

trojan
Dok Mac malware intercepts victims’ web traffic, installs backdoor

A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …

World target
IT service providers, many other orgs targeted in long-standing attack campaign

US-CERT has released an alert warning about a sophisticated attack campaign using multiple malware implants and targeting organizations in the IT, Energy, Healthcare and …

Will fileless malware push the antivirus industry into oblivion?

The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. …

smart hospitals, healthcare
How to securely deploy medical devices within a healthcare facility

The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt patients forever. A surgical …

Android unlocked
How secure are mobile banking apps?

Do banking institutions have a good handle on the things they need to remediate and new control layers they need to adopt to keep users secure? To answer those questions, …

spotlight
Executive spotlight: iovation’s new Vice President of Product

Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …

eye
Hackers explain how they “owned” FlexiSpy

How did the hackers that go by the name Decepticons breach stalkerware manufacturer FlexiSpy? According to information purportedly provided by the attackers themselves, it …

Don't miss

Cybersecurity news