Please turn on your JavaScript for this page to function normally.
WordPress
Is your WordPress site being misused for DDoS attacks?

Many WordPress websites are still being misused to perform layer 7 DDoS attacks against target servers, even though preventing them from participating in these attacks is as …

Bitcoin
Hollywood hospital pays ransom to get their computers, files back

The Hollywood hospital whose systems have been infected with ransomware has paid $17,000 to get the decryption key from the criminals, and is operating normally once again. …

Apple will fight court order to unlock gunman’s iPhone

A US magistrate judge has ordered Apple to help the FBI gain access to the contents of a PIN-locked iPhone 5C used by Syed Farook, one of the shooters in the San Bernardino …

terminal
Critical Glibc flaw opens Linux distros, other software and devices to compromise

A critical bug has been found to open an unimaginable number of computers, networking and other connected devices to attacks that can result in complete system compromise. …

robot
Dridex botnet alive and well, now also spreading ransomware

Last October’s disruption of the Dridex botnet by UK and US law enforcement agencies and the arrest of a Moldovan bot master have not lead to the death of the botnet. …

mobile devices
Review: Mobile Data Loss

Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

Magento
Year-old critical Magento flaw still exploited, payment info stolen

A whole year has passed since a critical e-shop hijacking flaw in the Magento CMS has been patched, but the vulnerability is still being exploited in attacks in the wild, …

Building
Smart buildings security: Who’s in charge?

As the Internet of Things became an accepted reality, and the security community realized that they have to get involved in securing it, days without news about the insecurity …

phone
VoIP phones can be turned into spying or money-making tools

A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …

UK security tribunal decides GCHQ’s hacking is legal

The UK GCHQ intelligence agency’s hacking of computers, mobile devices, smart devices, and computer networks has been ruled to be legal, no matter where it happens in …

Hollywood Presbyterian Medical Center
Hollywood hospital’s systems held hostage by hackers

The Hollywood Presbyterian Medical Center, an “acute-care facility” located in Los Angeles, has had its computer systems compromised by hackers. The attackers are …

Police
Teenage admin of anonymous XMPP service arrested in connection to fake bomb threats

The teenage administrator of the Darkness.su XMPP service has been arrested last Monday by the French police, in connection to the wave of false bomb threats that were made …

Don't miss

Cybersecurity news