Please turn on your JavaScript for this page to function normally.
Cisco releases tool for detecting malicious router implants

“Cisco Systems has provided a tool that allows enterprise users to scan their networks and discover if their routers have been compromised with malicious SYNful Knock …

Vulnerabilities in security software leave users open to attacks

In most people’s minds, antivirus and security software equals better security. But thanks to security researchers who have taken it upon themselves to analyze some of …

The number of fingerprints stolen in OPM hack rose to 5.6 million

Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …

Chinese promotion company hijacks Android devices around the world

“A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this …

Apple tackles the XcodeGhost crisis by removing apps, alerting devs and users

“The XcodeGhost incident has demonstrated that however secure a system is thought to be, there’s always a way in. It also shows how the very human tendency of …

Using external URL shorteners for internal needs may lead to sensitive data leaks

Using external URL shortener services to create better-looking links to internal company documents, sensitive files and internal websites is a practice that company employees …

Killing computer infrastructures with a bang!

In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …

WD My Cloud NAS devices can be hijacked by attackers

Researchers with security consultancy VerSprite have unearthed several vulnerabilities in Western Digital’s My Cloud NAS product, which can be exploited by local and …

Facebook tries to help advertisers and users with new ad control options

The ads you see on Facebook are set to become even more targeted, as the social network’s interest-based advertising, which they have been rolling out for the past year, …

Exploit broker offers $1 million for reliable iOS 9 exploit

Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the zero-day …

Android SMS Trojans evolve, go after bank and payment system accounts

“Once upon a time cyber crooks used SMS Trojans to earn themselves money by subscribing users to unwanted premium mobile services. Today, the situation has changed, and …

Number of XcodeGhost-infected iOS apps rises

“As the list of apps infected with the XcodeGhost malware keeps expanding, Apple, Amazon and Baidu are doing their best to purge their online properties of affected …

Don't miss

Cybersecurity news