Please turn on your JavaScript for this page to function normally.
Gmail
New Gmail phishing technique fools even tech-savvy users

An effective new phishing attack is hitting Gmail users and tricking many into inputing their credentials into a fake login page. How the attack unfolds The phishers start by …

password
The most common passwords of 2016

Despite having been predicted many times, the demise of the password as the preferred authentication method is still far off, as it’s difficult to beat its ease of use. …

Adobe Reader
Adobe quietly bundles data-collecting Chrome extension with latest Reader update

Chrome users who have installed the latest Adobe security updates have also been unknowingly saddled with a browser extension (“Adobe Acrobat”) that can collect some of their …

fire
Mobile forensics firm Cellebrite confirms data breach

Israeli mobile forensics firm Cellebrite has announced that it has suffered a data breach following an unauthorized access to an external web server. “The impacted …

shadow
Shadow Brokers say goodbye, leak a batch of Windows hacking tools

The Shadow Brokers, a group (?) of hackers that has made a big splash in August last year by leaking and offering for sale exploits supposedly stolen from the infamous …

Merlin
FDA urges patients to implement patch to secure their cardiac implants

Patients who have been implanted with pacemakers and defibrillators manufactured by US-based St. Jude Medical are urged to make sure that their Merlin@home Transmitter unit is …

cybercrime
Brother and sister arrested for spying on Italian politicians for years

Two Italian siblings have been arrested on Monday and stand accused of having spied on Italian politicians, state institutions and law enforcement agencies, businesses and …

Amazon
Amazon scammers hijack seller accounts, lure users with good deals

Amazon buyers are being targeted by clever scammers that either set up independent seller accounts or hijack those of already established, well-reputed sellers, then offer …

alert
Nagios Core 4.2.4 closes serious root privilege escalation bug

If you’re using Nagios Core to monitor your systems, networks and infrastructure, and you have not updated to version 4.2.4, you better hop to it. This latest release …

DNSchanger
Malvertising campaign compromises routers instead of computers

The DNSChanger exploit kit is back and more effective than ever, and is being used in a widespread malvertising attack whose goal is to compromise small/home office routers. …

Evernote
Evernote employees will be able to read notes only if users allow it

Evernote has recently announced that, starting on January 23, 2017, Evernote users’ unencrypted notes will be accessible to some Evernote employees. The change to the …

Yahoo
One billion users affected in newly revealed Yahoo hack

Yahoo has revealed that it’s been the victim of another hack and massive data breach that resulted in the compromise of information of a billion users! What happened? …

Don't miss

Cybersecurity news