Zeljka Zorz
Attackers can easily crack Belkin routers’ WPS PINs
A considerable number of routers manufactured by US-based Belkin use a flawed method for creating PINs for Wi-Fi Protected Setup (WPS), making them easily discoverable by …
US prohibits Intel to export chips for Chinese supercomputers
US chip maker Intel has been prohibited by the US Department of Commerce to export chips needed to upgrade Chinese supercomputers. The Department determined that “the …
TV5Monde makes new security blunders in wake of hack
Last week’s hack attack against TV5Monde resulted in the compromise of its website, social media accounts, the outage of its email server, and a temporary program …
TorLocker victims can decrypt most files without paying ransom
Crypto-ransomware rarely means good news for targets, but when it comes to TorLocker malware (detected as Trojan-Ransom.Win32.Scraper by Kaspersky Lab), the victims can …
Beware of malicious “Internal ONLY” emails
Malware peddlers are once again trying to trick users into downloading malware by sending out fake emails impersonating domain administrators. The email, with “Internal …
Latest OS X update closes backdoor that allows root access
On Thursday Apple released another batch of updates for a variety of its products. The security update for OS X Yosemite (10.10.3) includes a fix for a four-year-old …
Multi-platform AlienSpy RAT targeting consumers, enterprises
A new Java-based, multi-platform remote access trojan (RAT) is being used to target both consumers and enterprise users. It’s called AlienSpy RAT and, according to …
122 online forums compromised to redirect visitors to Fiesta exploit kit
Over a hundred forum websites have been compromised and injected with code that redirects users to sites hosting the Fiesta exploit kit, Cyphort researchers have found. These …
Scammers deliver malware via fake Steam game pages
Aside from being regularly targeted with phishing scams, fake giveaways leading to online surveys, and having malware pushed on them via Steam chat, gamers using the popular …
LG software disables Windows security feature, developer says
LG Split Screen software that comes with the company’s ultra wide monitors stealthily weakens Windows users’ defenses by deactivating the OS’ User Account …
Deadly combination of Upatre and Dyre Trojans still actively targeting users
Upatre (or Waski) is a downloader Trojan that has lately become the malware of choice for cyber crooks to deliver additional, more dangerous malware on users’ computers. …
HardSploit: Dedicated hardware pentesting tool
As Internet of Things adoption is gaining momentum, and we hear time and time again that making it secure will be the biggest challenge, French IT security consultancy Opale …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader