Please turn on your JavaScript for this page to function normally.
Keyboard
Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries

A group of scientists from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) believe they have created an effective and scalable text-messaging system …

Twitter
Twitter users warned about being targeted by state-sponsored attacks

Twitter has sent out unexpected warning notices to a number of users, informing them that their account might have been targeted by state-sponsored hackers. “We believe …

Steam
New Steam escrow system drives impatient users to fake trading sites serving malware

On Wednesday, Valve introduced a new “trade hold” system that should prevent scammers from stealing items from Steam users’ hijacked account, or at least …

Business email compromise scams still happening, still successful

Despite repeated warnings issued by law enforcement, information sharing organizations, and security companies, Business Email Compromise (BEC) scams still abound and the …

WP Engine breached, forces users to change their passwords

Popular WordPress-specific hosting provider WP Engine has apparently suffered a data breach, and is forcing their customers to change their passwords.“We are writing …

End-to-end encrypted database ZeroDB is now open source

ZeroDB, an end-to-end encrypted database whose release was announced earlier this year, is now open source. Developers MacLane Wilkison and Michael Egorov changed the license …

Microsoft kills many critical flaws, some 0-days, un-trusts one wildcard cert

For this December Patch Tuesday, Microsoft has released twelve security bulletins, eight of which have been rated critical.Those refer to the cumulative security updates for …

Apple releases security updates for every major product

Apple has released security updates for the operating systems running on the company’s iPhones, computers, Apple TV and various versions of smartwatches, as well as …

Flaws in industrial gas detectors exploitable by low-skilled attackers

Two industrial gas detector product lines manufactured by Honeywell sport two remotely exploitable vulnerabilities that can allow an attacker to retrieve the user’s …

Personal info of 12+ million Dutch mobile phone owners easily accessible to hackers

Sijmen Ruwhof, a freelance IT security consultant and ethical hacker from Utrecht, recently stumbled across what turned out to be an example of how poor security practices of …

Technology
Nemesis financial malware kit gains bootkit capabilities, extra stealth

A threat group that steals mostly payment card data from financial services organizations has added a bootkit utility to their malware toolkit. This new capability assures the …

Four critical Android bugs patched, one could lead to permanent device compromise

Google’s December security update for Android has been pushed out to Nexus devices on Monday, and it contains fixes for 19 vulnerabilities, four of which are deemed …

Don't miss

Cybersecurity news