Please turn on your JavaScript for this page to function normally.
Hacker steals Bitdefender customer info, blackmails company

A hacker has managed to access a database containing usernames and passwords of customers of Romanian AV maker Bitdefender, and has tried to blackmail the company into paying …

Hospitals advised to stop using vulnerable computerized drug pumps

The US Food and Drug Administration has issued a safety communication warning healthcare facilities using the Hospira Symbiq Infusion System – a computerized pump made …

Fake “Windows 10 Free Upgrade” emails deliver ransomware

“It didn’t take long for malware peddlers to take advantage of the huge interest users have shown into Windows 10. The newest version of the popular software was …

US will revise Wassenaar pact changes

US Commerce Department’s Bureau of Industry and Security (BIS) will rethink the Wassenaar pact changes regarding “cybersecurity items” that it proposed and made …

Researchers devise passive attacks for identifying Tor hidden services

A group of MIT researchers have devised two attacks that could identify, with a high degree of certainty (88%), an anonymous hidden service or client.Hidden services are …

New Android bug can put devices into a coma

In the wake of the explosive discovery of the Android Stagefright vulnerability, Trend Micro researchers have revealed the existence of another, similar one that can make …

Researchers hack Linux-powered sniper rifle

When talking about the Internet of Things – “things” with an embedded computing system able to interoperate within the Internet infrastructure – we …

United Airlines hacked by same group that breached Anthem and OPM

United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment …

Rowhammer.js: The first remote software-induced hardware-fault attack

A group of Austrian and French researchers have devised a relatively simple way to remotely exploit the Rowhammer bug present in some computer chips. Their version of the …

Check out the Windows 10 security features

Today is the day that Windows 10 becomes available to users around the world.The new (and some old-but-new again) features are already known to the public: the Start button is …

Breaches might be inevitable, but penalties are not harsh enough

A panel on the topic of data breaches organized by cyber security and penetration testing company Cognosec has revealed that most industry professionals believe that breaches …

Users force LinkedIn to bring back connections download tool used by scrapers

LinkedIn users have rejected a new data export process set up by the company, which would allow them to export their connections’ information with a delay of 24 or, …

Don't miss

Cybersecurity news