Please turn on your JavaScript for this page to function normally.
biohazard
Ransomware enters companies through RDP servers

Attackers wielding ransomware are targeting enterprises through an often-found hole in the corporate network: Internet facing, poorly secured remote desktop servers. According …

smartthings hub
Samsung’s smart home platform flaws let attackers fiddle with your doors

Researchers have managed to exploit design flaws in the Samsung SmartThings smart home programming platform and successfully mount a series of attacks that could result in …

Google Chrome
Malicious Chrome update actively targeting Android users

A fake malicious Chrome update is being actively pushed onto Android users, saddling them with information-stealing malware that can be uninstalled only by restoring the …

The Information Systems Security Officer's Guide, Third Edition
Review: The Information Systems Security Officer’s Guide, Third Edition

About the author Dr. Gerald Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security …

justice sentence gavel law court
US FISC approved all surveillance requests in 2015

The US Foreign Surveillance Intelligence Court (FISC) has approved every electronic surveillance request for foreign intelligence purposes it has received in 2015. As it turns …

keyboard
US Supreme Court approves expansion of FBI hacking powers

The US Supreme Court has approved on Thursday several changes to the federal rules around search warrants, one of which would allow US federal law enforcement agents to …

Android
Screen overlay Android malware is on the rise

As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in …

prison cell jail
Suspect refuses to decrypt hard drives, is detained indefinitely

A former Philadelphia Police Department sergeant suspected of possessing child pornography has spent seven months in a detention center without being charged of any particular …

Tor
Former Tor developer helped the FBI unmask Tor users

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

credit cards secure
PCI DSS 3.2 is out: What’s new?

The Payment Card Industry Security Standards Council has published the latest version of PCI DSS, the information security standard for organizations that handle customer …

rings
Gold-mining firm Goldcorp hacked, its data leaked online

Canadian gold-mining company Goldcorp has suffered a data breach of seemingly catastrophic proportions. On Tuesday, the attackers leaked a lot of sensitive internal data about …

LastPass
Fake Chrome LastPass extension leads to unwanted installs

A fake LastPass extension has been found lurking on the Chrome Web Store, offering promises of free and easy password management, but instead taking users for a ride involving …

Don't miss

Cybersecurity news