Please turn on your JavaScript for this page to function normally.
Android users rejoice! Security updates will be coming out faster

August 5, 2015, is the date that (hopefully) marks the beginning of one of the biggest positive changes in the Android ecosystem.Adrian Ludwig, Google’s lead engineer …

Microsoft expands Bug Bounty programs, increases rewards

Microsoft is continually tweaking its Bug Bounty programs, and the latest step in this evolution has been announced on Wednesday at Black Hat USA 2015.“We are raising …

Attackers use Google Drive, Dropbox to breach companies

A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …

WordPress 4.2.4 fixes critical vulnerabilities

It’s time to update your self-hosted versions of WordPress again.WordPress 4.2.4, released on Tuesday, fixes four bugs and several security issues: Three cross-site …

How to protect your privacy on Windows 10

So, you have decided to switch to Windows 10, but you heard that the new OS is a veritable vacuum for user data, which it sends back to Microsoft.Fear not! While most of the …

Chinese APTs use commercial VPN to hide their attack activity

A number of APT actors believed to be of Chinese origin are using a commercial VPN service to anonymize and obfuscate their attack activity.Dubbed Terracotta, the VPN service …

Attackers are downing DNS servers by exploiting BIND bug

As predicted, the critical and easily exploitable flaw that affects all versions of BIND, the most widely used DNS software on the Internet, has started being exploited by …

Malvertisers abused Yahoos ad network for days

“A large-scale malvertising attack abusing Yahoos ad network has been hitting visitors of the Internet giant’s many popular and heavy-traffic sites for nearly a …

Hackers actively exploiting OS X zero-day to root machines, deliver adware

“Attackers are actively exploiting a zero-day privilege escalation vulnerability affecting the latest version of Apple’s OS. The bug’s existence has been …

Macs can be permanently compromised via firmware worm

“Security researchers Xeno Kovah and Trammell Hudson have discovered several flaws in the firmware installed on Apple computers, and have created a worm that can …

Chrome extensions easily disabled without user interaction

Independent researcher Mathias Karlsson has discovered a vulnerability that can be exploited to disable Chrome extensions without user interaction.Apparently, the bug has …

Health records of 5.5 million US patients accessed in MIE breach

The Indiana Attorney General’s Office has launched an investigating into the recent breach suffered by Medical Informatics Engineering (MIE) and its subsidiary …

Don't miss

Cybersecurity news