Please turn on your JavaScript for this page to function normally.
bomb
New PowerPoint malware delivery technique tested by spammers

A spam run detected by several security companies has attempted to deliver malware through an innovative technique: a link in a PowerPoint slideshow. The attack unfolds like …

Al Jazeera
Al-Jazeera reportedly hit by systematic hacking attempts

Al-Jazeera, the Doha-based broadcaster owned by the ruling family of Qatar, says the websites and digital platforms of Al Jazeera Media Network, its parent company, “are …

Laptop
Email-borne threats: Watch your inbox closely on Thursdays

Malicious email attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favor sending malicious …

camera
Foscam IP cameras riddled with gaping security holes

F-Secure researchers have discovered a bucketload of serious security vulnerabilities affecting IP cameras made by Chinese manufacturer Foscam. Even though notified months …

Android malware
Malicious ads trigger drive-by download of persistent Android adware

UK and US Android users have been saddled with unwanted apps via malicious ads that executed a drive-by download attack. According to Zscaler researchers, the malicious ads …

GnuPG
GnuPG developers start new fundraising effort

Werner Koch and his team of GnuPG developers are asking for funding for the continued development of the popular free email and data encryption software. What is GnuPG, and …

car
Unprotected database exposes VINs, owner info of 10 million cars

A database containing information on 10 million cars sold in the US and personal information about their owners has been found exposed online. The unprotected database was …

biohazard
Backdoored Firefox extension checks Instagram for C&C info

Turla, an APT cyberespionage group that has been targeting corporations, intelligence and other government agencies for years, is using a malicious Firefox extension to …

CTF
Google CTF 2017 announced: Test your skills!

Google has announced the 2017 edition of its Capture The Flag (CTF) competition. As before, the event is divided into two rounds: The qualification round, to be held online on …

architecture
Introducing security into software through APIs

Application programming interfaces (APIs) can make life easier for software developers, allowing them to concentrate on what they do best and preventing them from being forced …

communication
What’s really stopping users from adopting secure communication tools?

“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …

USA flag
US visa applicants will have to provide social media handles

US consular officials have been provided with a new questionnaire that they can give selected visa applicants to complete. Among other things, Form DS-5535 requires applicants …

Don't miss

Cybersecurity news