Please turn on your JavaScript for this page to function normally.
fish phishing
Phishers are impersonating major UK banks on Twitter

Customers of UK banks are being targeted by phishers impersonating the banks’ customer support account on Twitter, Proofpoint warns. The phishers usually choose a …

Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

Dyn
Dyn DDoS attack post-mortem: Users inadvertently helped

As StarHub, one of the three major telcos in Singapore, confirmed that they were the latest victim of “intentional and likely malicious distributed denial-of-service …

iPhone business
Malicious JPEGs can compromise your iPhone

A vulnerability in the iOS CoreGraphics component allows attackers to compromise iDevices by tricking victims into viewing a maliciously crafted JPEG file. The good news is …

Dyn
Dyn DDoS attack: The aftermath

On October 21, New Hampshire-based Internet performance management company Dyn suffered the largest DDoS attack ever to be registered. The attacks – there were three, in …

IP Vanish VPN
IPVanish VPN unveils new app, security improvements

US-based IPVanish VPN, whose VPN network spans 40,000+ IPs on 500+ servers in 60+ countries, has recently pushed out a major new edition of its app. The new version (v3.0) has …

connection
Major US DNS provider hit with DDoS, part of the Internet becomes unreachable

US-based DNS provider Dyn has suffered a massive DDoS attack earlier today, and it resulted in many websites being completely or intermittently inaccessible for a few hours. …

Linux
Dirty COW Linux kernel zero-day exploited in the wild is now patched

Linux developer Phil Oester has spotted attackers exploiting a Linux kernel zero-day privilege escalation flaw that dates back to 2007, and has raised the alarm. The …

Weebly
43+ million users affected by confirmed Weebly breach

Weebly, a popular web-hosting service featuring a drag-and-drop website builder, has been breached, and email addresses/usernames, IP addresses and encrypted passwords for …

Chaos Monkey
Use Chaos Monkey to push engineers to build resilient cloud services

Netflix’s engineering team is good at sharing the tools they create, and keeping them updated to serve different needs. Chaos Monkey is the latest offering that received …

MBRFilter: Cisco open sources tool to protect the Master Boot Record

Cisco’s Talos research team has open sourced MBRFilter, a tool that aims to prevent a system’s Master Boot Record (MBR) getting overwritten by malware. The latest …

Cisco
Cisco plugs critical bug in ASA security devices

Cisco has patched a critical vulnerability in the Identity Firewall feature of Cisco ASA Software, which would allow a remote attacker to execute arbitrary code and obtain …

Don't miss

Cybersecurity news