Zeljka Zorz
Free tool to remove YiSpecter iOS malware
“Zimperium has released a tool to help iOS users that have been infected with the recently spotted YiSpecter advertising malware remove the threat from their devices. …
Huawei 3G routers rife with flaws
South Korean security researcher Pierre Kim has revealed today that fifteen Huawei 3G routers have a slew of serious vulnerabilities – RCE, XSS, CSRF, DoS, …
Amazon launches AWS web application firewall
A new option has been offered to Amazon Web Services customers who want to increase the security of their servers: AWS WAF. This web application firewall aims to stop random …
Previously unknown Moker RAT is the latest APT threat
“Researchers over at cybersecurity company enSilo have discovered a novel, powerful and persistent type of malware plaguing the network of one of their customers. This …
IP camera manufacturers force researcher to pull conference talk
A researcher has been forced to cancel his presentation on the vulnerabilities found on major surveillance cameras and how they can be exploited “due to legal threats …
Google patches Stagefright 2.0 on Nexus devices
Google has released its monthly security update for Nexus devices. Among the issues this update fixes are the two vulnerabilities in the stagefright and utils Android …
Attackers take over org’s OWA server, harvest domain credentials with malicious DLL
Researchers from cyber attack detection and response outfit Cybereason have discovered a novel APT technique that was used by attackers to gain persistence in an (unnamed) …
T-Mobile customer data stolen from Experian already for sale
The personal info of 15 million T-Mobile USA customers stolen in the recently revealed Experian breach is possibly being already sold on the Dark Web.Irish fraud prevention …
Cisco disrupts major ransomware campaign that brought in $30M annually
“Cisco researchers, with the help of Level 3 Threat Research Labs and OpenDNS, have managed to strike a considerable blow against ransomware peddlers that used the …
Nuclear facilities are wide open to cyber attacks
You would think that, given the potential disastrous consequences of a successful hack, the computer systems and networks of nuclear facilities would be better secured agains …
Millions affected by Scottrade brokerage breach that dates back two years
Missouri-based retail brokerage firm Scottrade has suffered a breach nearly two years ago, but they are only notifying their customers about it now, because they only found …
Car hacking via compromised car diagnostic tools
Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine