Please turn on your JavaScript for this page to function normally.
LastPass breached, hashed master passwords compromised

LastPass, the company behind the popular password management service of the same name, has announced on Monday that they have suffered a breach, and has urged users to verify …

Trojan uses steganography to hide itself in image files

“The Dell SecureWorks CTU research team has recently analyzed a piece of malware that uses digital steganography to hide part of its malicious code. Stegoloader, as they …

Stolen Foxconn certs used to sign malware used in Kaspersky Lab attack

“After last week’s revelation that their corporate network has been hit by APT actors wielding a newer version of the infamous, Stuxnet-related Duqu attack …

Emojis instead of PIN codes as an alternative for forgetful users

For years now companies have been trying to come up with alternatives to passwords and passcodes that will be easier to remember (for users) and more difficult to guess or …

Rethinking security: Securing activities instead of computers

For many people involved in the infosecurity community, the notion of security is too often tied to the quality of code (resistance to specific classes of bug, for example) …

OPM hack: Vast amounts of extremely sensitive data stolen

The extent of the breach suffered by the US Office of Personnel Management has apparently widened. Reports are coming in that the hackers have not only accessed Social …

Microsoft flags Ask toolbar as unwanted and dangerous

From this month on, all versions of Ask.com’s infamous browser toolbar except the very last will be detected as unwanted software by Microsoft security products and …

New OpenSSL versions squash LogJam bug

The OpenSSL Project has pushed another update for the eponymous open-source cryptographic library. This one plugs several moderate bugs, one low one, and LogJam …

Trojanized Sberbank mobile app lurking on third-party stores

“A Trojanized Android version of the Sberbank online banking mobile application is being distributed via third-party online stores and file-sharing sites, warns Russian …

Serious MitM flaw plugged in latest watchOS version

If you’ve recently bought an Apple Watch, or if you have had one for a while now, but you haven’t updated to the latest watchOS version, now is the time to do it …

Bug in iOS Mail app is a dream come true for phishers

A serious bug in the default Apple iOS Mail application can be easily exploited to show extremely realistic-looking pop-up prompts and trick users into sharing their Apple …

How to develop effective honeypots

Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …

Don't miss

Cybersecurity news