Please turn on your JavaScript for this page to function normally.
malware
Dyre gang taken down by Russian authorities

Dyre (aka Dyreza), one of the most widespread and effective financial Trojans to crop up in the last few years, is currently not an active threat. In fact, spam campaigns …

Bitcoin
Loanbase hacked via WordPress hole, funds stolen

Popular international Bitcoin crowd-lending platform Loanbase has suffered a security breach, and is currently offline. The breach was discovered on Saturday and made public …

Skype
T9000 backdoor steals documents, records Skype conversations, victims’ actions

A new backdoor Trojan with spyware capabilities is being used in targeted attacks against organizations based in the United States. It has been dubbed T9000, since it’s …

Twitter
Twitter suspended 125,000 terrorism-related accounts

Since mid-2015, Twitter has suspended over 125,000 accounts “for threatening or promoting terrorist acts.” Most of these were related to ISIS. “We condemn …

Business ideas
Someone hijacked the Dridex botnet to deliver Avira AV’s installer

After last September’s arrest of an alleged member of the gang that has been developing and spreading the Dridex banking malware, and last October’s temporary …

Apple
Mac users beware! Scareware hides behind fake Flash Player update

Mac users are being targeted by scareware peddlers, warns SANS ISC CTO Johannes Ullrich. The malware is delivered in the form of a Flash Player update. The attack starts on …

Amazon
Fake Amazon survey-for-money offer leads to account compromise

Amazon users are being targeted with a clever phishing email impersonating the retail giant. “As a valued customer we would like to present you with an opportunity to …

Google
Google declares war against deceptive download buttons

There’s likely no Internet user that hasn’t, at some point, been tricked into clicking on a deceptive “download,” “install,” or …

brain
Harnessing artificial intelligence to build an army of virtual analysts

Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …

backdoor
Year-old crypto flaw in Socat created a potentially intentional backdoor

A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …

Comodo Dragon
Comodo Internet Security installs insecure Chrome-based browser

Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …

Fisher-Price Smart Toy
Security flaws discovered in smart toys and kids’ watches

Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …

Don't miss

Cybersecurity news