Please turn on your JavaScript for this page to function normally.
NASCAR
NASCAR team falls victim to ransomware, pays ransom

Most US businesses would perhaps not pay in the event of a ransomware attack, but Circle-Sport Leavine Family Racing (CSLFR), a professional NASCAR car racing team, is not one …

USA flag
FBI doesn’t need a warrant to hack a suspect’s computer, US judge rules

A senior US district judge has decided that the warrant authorizing the search of a suspect’s home computer by the FBI was issued based of probable cause, but even if it …

rings
Exfiltrating data from air-gapped computers by modulating fan speed

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, …

Nexus
Your nearest and dearest are snooping on your phone

If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there’s a good chance that one or more of the people close to you …

USA flag
154 million US voter records exposed following hack

MacKeeper security researcher Chris Vickery has discovered yet another database containing voter profiles of US citizens, accessible to anyone who stumbled upon it or knew …

tools
Severe flaws patched in libarchive, dependent projects urged to follow

Three severe bugs that could be easily exploited to perform arbitrary code execution have been patched with version 3.2.1 of the libarchive open source multi-format archive …

key
ApocalypseVM ransomware decrypter released

AV company Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM. The tool works on the latest versions of the ransomware in …

fake tech support isp
Tech support scammers impersonate victims’ ISP

Tech support scammers have switched from cold calls to pop-ups ambushing users online, seemingly coming from the victims’ ISP. In the US and Canada, Verizon, AT&T …

google prompt
Google’s new authentication option: a tap on the screen

Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …

security camera
Unsecured security cameras lead to privacy erosion

The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …

SilentCircle Privacy Meter
Blackphone users get a virtual privacy assistant

Silent Circle has pushed out a new version of Silent OS, the operating system running on Blackphone 2 devices, and it comes with several privacy and security enhancements, …

LogMeIn
Poorly crafted LogMeIn password reset email looks phishy, but isn’t

LogMeIn has been sending out password reset emails to some of its customers, to prevent account hijacking fuelled by the recent spate of massive login credential leaks. …

Don't miss

Cybersecurity news