Please turn on your JavaScript for this page to function normally.
encryption
GhostMail stops providing secure comms to individual users

Encrypted email, chat and storage service GhostMail will no longer provide its services to individual users. Instead, it will concentrate on the enterprise market. In an email …

person
Data of 200 million Yahoo users offered for sale

Data of some 200 million Yahoo users has been offered for sale on the TheRealDeal dark web market by “peace_of_mind” (aka “Peace”). Even though Yahoo is yet to confirm whether …

UK banks ramp up account security with voice recognition tech

British banking and financial services multinational Barclays has announced that it is introducing voice recognition technology for all personal banking customers, so that …

bug
Kaspersky Safe Browser iOS app sports MITM SSL certificate bug

Security researcher David Coomber has unearthed a vulnerability (CVE-2016-6231) in the Kaspersky Safe Browser iOS app that effectively contradicts its name. As it turns out, …

QRLJacking: A new attack vector for hijacking online accounts

We all know that scanning random QR codes is a risky proposition, but a newly detailed social engineering attack vector dubbed QRLJacking adds another risk layer to their use. …

target
Innovative techniques allow malvertising campaigns to run for years

A threat actor dubbed AdGholas has been mounting successful malvertising campaigns by using innovative targeting and obfuscation techniques, and has been infecting thousands …

face
Intel Crosswalk bug invalidates SSL protection

A bug in the Intel Crosswalk Project library for cross-platform mobile development can open users to man-in-the-middle attacks, researchers from Nightwatch Cybersecurity have …

Biohazard
SpyNote Android RAT builder has been leaked

A builder for the capable SpyNote Android RAT is being freely distributed on several underground hacker forums. SpyNote is capable of viewing messages on the infected device, …

Flashpoint dark web
Investigating the supply on 17 underground hacker markets

Have you ever wondered what kind of malicious offerings can be found on dark web “hacker markets,” who sells them and how widely they are available? Three …

HTML Source Code Viewer
Media-stealing Android app targets developers

Symantec researchers have unearthed another app on Google Play that secretly steals photos and videos from victims’ mobile devices. But the curious thing is that it’s …

Android
How Google protects the Android kernel, and future plans

On Wednesday, Jeff Vander Stoep of Google’s Android Security team took to the official Android Developers blog and shared some information about the defenses they have …

USA
Obama defines how the US government will respond to cyber incidents

US president Barack Obama approved on Tuesday the Presidential Policy Directive on United States Cyber Incident Coordination (PPD-41). What’s the PPD-41 all about? …

Don't miss

Cybersecurity news