Please turn on your JavaScript for this page to function normally.
key
ApocalypseVM ransomware decrypter released

AV company Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM. The tool works on the latest versions of the ransomware in …

fake tech support isp
Tech support scammers impersonate victims’ ISP

Tech support scammers have switched from cold calls to pop-ups ambushing users online, seemingly coming from the victims’ ISP. In the US and Canada, Verizon, AT&T …

google prompt
Google’s new authentication option: a tap on the screen

Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …

security camera
Unsecured security cameras lead to privacy erosion

The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …

SilentCircle Privacy Meter
Blackphone users get a virtual privacy assistant

Silent Circle has pushed out a new version of Silent OS, the operating system running on Blackphone 2 devices, and it comes with several privacy and security enhancements, …

LogMeIn
Poorly crafted LogMeIn password reset email looks phishy, but isn’t

LogMeIn has been sending out password reset emails to some of its customers, to prevent account hijacking fuelled by the recent spate of massive login credential leaks. …

bomb
Botnet-powered account takeover campaign hit unnamed bank

A single attacker has mounted two massive account takeover (ATO) campaigns against a financial institution and an entertainment company earlier this year, and used a gigantic …

Apple
There’s no virus in the iTunes database – it’s a phish!

A new phishing campaign aimed at Apple users has been spotted by security researcher Bryan Campbell. It takes the form of a fake email supposedly sent by Apple Service, …

anonymous
Tor Project tests new tool for foiling deanonymization attacks

Upcoming hardened releases of the Tor Browser will use a new technique aimed at preventing deanonymization efforts by anyone who might want to mount them. Created by a group …

Windows 10
Bloatware-be-gone refresh tool added to Windows 10

In the latest test build of Windows 10 Anniversary Update released last week, Microsoft has introduced a tool that allows users to get rid of bloatware and crapware with one …

GoToMyPC
GoToMyPC remote desktop service resets all passwords in wake of attack

GoToMyPC, a remote computer administration service offered by Citrix, has forced a password reset for all customers in the wake of what they call a “very sophisticated …

match
The DAO is under attack, a third of its ether reserves stolen

The DAO, a digital Decentralised Autonomous Organisation that has been set up to support projects related to Ethereum, a public blockchain platform that allows programmable …

Don't miss

Cybersecurity news