Please turn on your JavaScript for this page to function normally.
code
Source code of “game changer” Android banking malware leaked online

If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking …

Apple
Apple to US govt: Withdraw demand for iPhone unlocking, we all need to talk first

The battle between Apple and the US Justice Department continues, as the company still refuses to help the feds access the contents of a PIN-locked iPhone used by gunman Syed …

ZergHelper
Pirated App Store client for iOS found on Apple’s App Store

An app called 开心日常英语 (“Happy Daily English”), which has been offered for download via Apple’s official App Store, has been revealed to be a fully functional …

Linux Mint
Linux Mint hack: Backdoored ISOs, stolen forums database

The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …

market
IRS warns of 400 percent surge in tax-related phishing emails

The number of tax related phishing and malware incidents has exploded this US tax season, the US Internal Revenue Service (IRS) has warned on Thursday. All in all, there has …

Connect
DHS releases guidelines for CISA-sanctioned cybersecurity information sharing

The US Department of Homeland Security has published guidelines on how the private sector and federal entities can share cyber threat indicators (CTIs) with the US federal …

Android Marshmallow
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer

Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …

ransomware livechat
Ransomware offers customer support via chat

PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …

Broken glass
E-commerce web apps vulnerable to hijacking, database compromise

High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source …

WordPress
Is your WordPress site being misused for DDoS attacks?

Many WordPress websites are still being misused to perform layer 7 DDoS attacks against target servers, even though preventing them from participating in these attacks is as …

Bitcoin
Hollywood hospital pays ransom to get their computers, files back

The Hollywood hospital whose systems have been infected with ransomware has paid $17,000 to get the decryption key from the criminals, and is operating normally once again. …

Apple will fight court order to unlock gunman’s iPhone

A US magistrate judge has ordered Apple to help the FBI gain access to the contents of a PIN-locked iPhone 5C used by Syed Farook, one of the shooters in the San Bernardino …

Don't miss

Cybersecurity news