Please turn on your JavaScript for this page to function normally.
dollar
How to steal money from Instagram, Google and Microsoft

Some account options deployed by Instagram, Google and Microsoft can be misused to steal money from the companies by making them place phone calls to premium rate numbers, …

Pokemon GO
Have you read Pokémon GO’s Terms of Service? You might want to

As Pokémon GO becomes available in more and more countries, and is enthusiastically embraced by an increasingly larger number of users, we’re witnessing a wide array of …

Joomla!
Compromised Joomla sites are foisting ransomware on visitors

Administrators of WP and Joomla sites would do well to check for specific fake analytics code injected into their properties, as a ransomware delivery campaign taking …

Ubuntu
Ubuntu Forums hacked again, 2 million users exposed

Canonical’s Ubuntu Forums have been hacked, and the attacker has managed to access and download part of the Forums database, containing usernames, email addresses and …

Pokémon GO
Pokémon GO-themed malicious apps lurk on Google Play

Researchers have discovered three malicious apps taking advantage of Pokémon GO’s immense popularity, offered for download on Google Play. Google has already removed …

phone call
Android Trojan prevents victims from calling their banks

Some malware prevents victims to visit sites from which they could download antivirus software, or kills AV software found running on the infected machines and devices. Newer …

US DOJ can’t access data stored abroad with just a warrant, court rules

The US Department of Justice cannot force Microsoft to produce the contents of a customer’s email account stored on a server located outside the US with just a warrant, a US …

Riffle: A new anonymity system to rival Tor

A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation …

hands
Tor Project gets whole new board of directors

Tor Project’s entire board of directors has stepped down and announced their successors. Among them are the noted “security guru” Bruce Schneier and Cindy …

accept
“I agree to these terms and conditions” is the biggest lie on the Internet

Two communications professors have proven what we all anecdotally knew to be true: the overwhelming majority of Internet users doesn’t read services’ terms of …

bug
Microsoft splats bug that turns printers into drive-by exploit kits

In this month’s Patch Tuesday, Microsoft has released 11 sets of patches – 6 “critical” and 5 “important.” The good news is that none of …

key
Shard: Open source tool checks for password re-use

Security researcher Philip O’Keefe has created a tool that allows users to check whether they have reused a password on multiple accounts. The impetus behind the …

Don't miss

Cybersecurity news