Please turn on your JavaScript for this page to function normally.
Malware Domain Generating Algorithms are becoming more sophisticated

Malware cut off from its C&C servers is effectively useless to its masters, so they are continually trying to find new ways of maintaining that connection at all times. …

Open Whisper Systems helps WhatsApp achieve end-to-end encryption

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …

Cisco open sources Big Data security analytics framework

“Technically advanced attackers often leave behind clue-based evidence of their activities, but uncovering them usually involves filtering through mountains of logs and …

Michaels and Staples breaches carried out by same attackers?

The attackers that stole payment card information from consumers of Texas-based arts and crafts store chain Michaels and international office supply chain store Staples are …

Trojanized Android firmware found on inexpensive handhelds

It’s unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it’s no guarantee that it’s malware-free. Researchers from …

Suspected WireLurker creators and distributors arrested in China

Three individuals been arrested by the Beijing Municipal Public Security Bureau in connection to the WireLurker OS X and iOS malware being served to users of Maiyadi, a …

Attackers shellshock, take over devices running on BusyBox

ShellShock, the remote code execution bug (CVE-2014-6271) affecting GNU Bash, the command interpreter present on many Unix systems and Linux distributions, is still being …

US State Department targeted by hackers

Around the same time the unclassified network of the Executive Office of the US President was breached, the same thing happened to some computer systems belonging to the US …

Malicious Tor exit node is run by MiniDuke APT actors

The malicious Tor exit node located in Russia that added malicious code to the software downloaded by users has been tied to the APT actors wielding the MiniDuke backdoor. …

Default ATM passcodes still exploited by crooks

Once again, ATMs have been “hacked” by individuals taking advantage of default, factory-set passcodes. This time the passcode hasn’t been guessed, or ended …

Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack

The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …

Facebook updates terms and policies, introduces interactive privacy guides

Facebook continues with its plan to make the social network’s privacy settings easier to understand, and has introduced Privacy Basics. Private Basics is a page where …

Don't miss

Cybersecurity news