Please turn on your JavaScript for this page to function normally.
Mitsubishi PHEV
Researchers hack the Mitsubishi Outlander SUV, shut off alarm remotely

Mitsubishi Outlander, a popular hybrid SUV sold around the world, can be easily broken into by attackers exploiting security weaknesses in the setup that allows the car to be …

badblock
Destructive BadBlock ransomware can be foiled

If you have been hit with ransomware, you want that malware to be BadBlock – but only if you haven’t restarted your computer. This particular malware is a …

Industry
ICS-focused IRONGATE malware has some interesting tricks up its sleeve

FireEye researchers discovered a malware family that’s obviously meant to target ICS systems, but found no evidence that it was ever used in the wild. They were unable …

GitHub
Malware devs scour GitHub for new ideas for bypassing Android security

Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the …

Lenovo
Lenovo tells users to uninstall vulnerable Accelerator app

In the wake of Duo Security’s report on the critical vulnerabilities sported by Original Equipment Manufacturer (OEM) updaters loaded on popular laptop and desktop …

Review: Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your Own

About the author Dejan Kosutic is the author of numerous articles, tutorials, documentation templates, webinars, and courses about information security and business continuity …

skull
Russian ransomware boss earns $90,000 per year

Despite too many users not even being aware of the existence of the ransomware threat, there is no doubt that it’s currently one of the most popular ways for cyber …

KeePass
KeePass update check MitM flaw can lead to malicious downloads

Open source password manager KeePass sports a MitM vulnerability that could allow attackers to trick users into downloading malware disguised as a software update, security …

FBI
FBI warns about email extortion attempts following data breaches

FBI’s Internet Crime Complaint Center has issued a public service announcement warning users about email extortion attempts related to recent high-profile data thefts. …

Bug
Bug poachers target businesses, demand money for bug info

Businesses are being hit with an extortion attempt based on attackers penetrating their network or websites and stealing corporate or user data. The attackers don’t say …

Windows
Windows zero-day exploit offered for sale on underground market

Someone is selling an exploit for a Windows zero-day on an underground market for Russian-speaking cyber criminals, and the current price is set at $90,000. Trustwave …

connection
Improving software security through a data-driven security model

The current software security models, policies, mechanisms, and means of assurance are a relic of the times when software began being developed, and have not evolved along …

Don't miss

Cybersecurity news