Please turn on your JavaScript for this page to function normally.
powerware decrypter in action
Decrypter for Locky-mimicking PowerWare ransomware released

Palo Alto Networks’ researchers have created a decrypter for the variant of the PoshCoder ransomware that imitates the Locky ransomware. Dubbed PowerWare by the …

introspection device snowden
Snowden wants you to know when your phone is revealing your location

NSA whistleblower Edward Snowden and hardware hacker Andrew “Bunnie” Huang have possibly come up with a solution for warning users when their phones are revealing their …

tinder
Victims of Tinder safe dating scam can lose a lot of money

Users of Tinder, the massively popular location-based dating app, are being targeted with a clever scam that may make them lose over a $100 per month. The Tinder safe dating …

Dell
Dell SonicWALL GMS comes with hidden default account

While developing new audit modules for the company’s vulnerability scanning technology, Digital Defense researchers found six vulnerabilities in Dell’s SonicWALL …

servers
Cisco plugs critical flaw in data center operations management solution

Cisco has patched another critical vulnerability in its Unified Computing System Performance Manager software. Cisco UCS Performance Manager is a data center operations …

lock
Bart ransomware victims get free decryptor

AVG malware analyst Jakub Kroustek has devised a decryptor for Bart ransomware, and the company has made it available for download (for free). Bart ransomware This particular …

jigsaw
Oracle splats 276 bugs with mammoth Critical Patch Update

In case you missed it, Oracle’s July 2016 Critical Patch Update is out, and it’s bigger than ever before. It plugs 276 security issues across hundreds of Oracle …

Dunlop
Slew of WP-based business sites compromised to lead to ransomware

If an approach works well, there is no reason to change tack, and the masters of the SoakSoak botnet are obviously of the same belief. A year and a half after they have been …

Biohazard
Ammyy Admin remote admin tool repeatedly bundled with Trojans

The website of the company that develops the popular remote administration software Ammyy Admin has been repeatedly compromised in the last year or so, and users who …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

httpoxy
Widespread httpoxy vulnerabilities affect server-side web apps

A new, branded set of vulnerabilities has been revealed by security researchers, this time responsibly and without too much fanfare. The collective name given to the …

alpha CrypTech
Open source hardware cryptographic module offered for $800

For a few years now, the CrypTech project has been working on designing an open source hardware cryptographic engine that could be used to secure core Internet infrastructure. …

Don't miss

Cybersecurity news