Please turn on your JavaScript for this page to function normally.
Data dump points to a breach at Electronic Arts

Account details of some 600 Electronic Arts (EA) customers have apparently been leaked on Pastebin. The company has yet to confirm whether the leak is genuine. “At this …

Cyber warfare fears spur US Navy to teach celestial navigation again

After Sony was hacked and the stolen emails leaked, some US companies began urging workers to revert to using phone calls and face-to-face meetings for sensitive discussions. …

Attackers can use Siri, Google Now to secretly take over smartphones

A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …

USB Killer 2.0: A harmless-looking USB stick that destroys computers

Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer …

Microsoft fixes critical flaws in all versions of Windows and Office

This month’s Microsoft Patch Tuesday brings fixes for 33 vulnerabilities. Nearly half of those are found in Internet Explorer, and most of them are critical as they …

Hackers are exploiting zero-day flaw in fully patched Adobe Flash

Adobe has released on Tuesday security updates that address multiple vulnerabilities in Reader, Acrobat, and Flash Player. Unfortunately, among the holes plugged in Flash …

UK, US law enforcement agencies disrupt Dridex botnet

The UK’s National Crime Agency is spearheading an onslaught against the Dridex (aka Bugat, aka Cridex) banking malware and the criminals that wield it.“Dridex …

WiFi jamming attacks more simple and cheaper than ever

A security researcher has demonstrated that jamming WiFi, Bluetooth, and Zigbee networks is not difficult to perform but, most importantly, also not as costly as one might …

America’s Thrift Stores breached by Eastern European criminals

America’s Thrift Stores, a for-profit organization that operates thrift stores in Alabama, Georgia, Louisiana, Mississippi and Tennessee, is the victim of a data …

IoT
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …

Android ransomware gets new, professional look thanks to Googles Material Design

“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …

Thousands of Zhone SOHO routers can be easily hijacked

Two days before he is scheduled to give a talk about discovering and exploiting 0-day vulnerabilities in SOHO routers’ firmware, security researcher Lyon Yang has …

Don't miss

Cybersecurity news