Please turn on your JavaScript for this page to function normally.
FBI
Google publishes eight national security letters

Have you ever wondered what a national security letter (NSL) received by Google looks like? Well, wonder no more, as the Internet giant has published eight of them. Along with …

Joomla!
Joomla vulnerability can be exploited to hijack sites, so patch now!

If you’re running a website on Joomla, you should update to the newly released 3.6.5 version as soon as possible – or risk your site being hijacked. The newest …

backdoor
ENISA says crypto backdoors are a bad idea

“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …

Office 365
Corporate Office 365 users hit with clever phishing attack

Corporate Office 365 users are being targeted by phishers using a clever new trick to bypass email filters and the default security protections of the Microsoft service. The …

Netgear R8000
Netgear pushes out beta firmware for vulnerable router models

Netgear has confirmed that eight of its router models are vulnerable to device hijacking due to a vulnerability that can be easily exploited by remote, unauthenticated …

More Android-powered devices found with Trojans in their firmware

Doctor Web researchers have discovered two types of downloader Trojans that have been incorporated in the firmware of a number of Android-powered devices. Both Trojans are …

attack
McAfee Virus Scan Enterprise opens Linux machines to remote attackers

Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …

Money
Zcash mining software covertly installed on victims’ machines

Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not …

New AirDroid releases fix major security issues

Popular AirDroid remote management tool for Android can now be used without worrying about malicious updates and data theft, its developers claim. What was the problem? Mobile …

Netgear R700
Critical flaw opens Netgear routers to hijacking

Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be …

keys
OpenVPN to get two separate security audits

VPN service Private Internet Access (PIA) announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of OpenVPN. …

Thyssen Krupp
Hackers stole technical trade secrets from German steelmaker

German-based ThyssenKrupp, one of the world’s largest steel producers, has announced that it has been the target of a cyber attack. The company said that the attack was …

Don't miss

Cybersecurity news