Please turn on your JavaScript for this page to function normally.
Volkswagen
Hundreds of millions of cars can be easily unlocked by attackers

Security researchers have come up with a way to unlock cars manufactured by vendors around the world, and are set to present their findings on Friday at the Usenix security …

Book: Cyber Guerilla
Review: Cyber Guerilla

About the authors Jelle Van Haaster is an officer in the Royal Netherlands Army and has a background in legal, military, and technical defense matters. Rickey Gevers is …

tunnel light
Over 300 new cyber threats pop up on underground markets each week

Approximately 305 new cyber threats are added each week on cybercrime markets and forums, mostly located on the dark web. The threats include information on newly developed …

There’s a way to use encrypted data without knowing what it holds

Microsoft researchers have devised a way for third parties to make use the vast amount of encrypted data stored in the cloud by companies and individuals, without them …

Dota 2
Dota 2 Dev forum breached, nearly 2 million users affected

A hacker has breached the official Dota 2 Dev forum and made off with the entire forum database, which contains email addresses, usernames, IP addresses, and salted password …

eye
Top-level cyber espionage group uncovered after years of stealthy attacks

Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile …

Broken glass
Oracle-owned MICROS PoS systems vendor breached

MICROS, the point-of-sale payment systems vendor owned by Oracle, has suffered a data breach, and there are indicators that point to the infamous Carbanak (aka Anunak) …

binary bomb
Malware hidden in digitally signed executables can bypass AV protection

Researchers have shown that it’s possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute this code – all …

Cerber2 ransomware released, no decryption tool available

The author of the widely distributed Cerber ransomware has released a newer version, and files encrypted with Cerber2, unfortunately, can’t be decrypted without paying …

Windows
Remote Butler attack: APT groups’ dream come true

Microsoft security researchers have come up with an extension of the “Evil Maid” attack that allows attackers to bypass local Windows authentication to defeat full …

Spoofing boarding pass QR codes with simple app

Przemek Jaroszewski, the head of Poland’s CERT, says anyone can bypass the security of the automated entrances of airlines’ airport lounges by using a specially …

Zeus Panda variant targets Brazilians, wants to steal everything

A new Zeus Trojan variant dubbed Panda Banker has been specially crafted to target users of 10 major Brazilian banks, but also other locally popular services. “Zeus …

Don't miss

Cybersecurity news