Please turn on your JavaScript for this page to function normally.
Hacker nets over $600k by compromising NAS systems to mine Dogecoin

A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over …

There’s a new banking Trojan in town

A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …

Java program to reverse Android ransomware damage

University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …

A new defense against kernel-mode exploits

Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …

Being a CISO at a higher education institution

In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …

Use your own encryption keys for Amazon S3 storage

Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …

Microsoft says user content won’t be used for targeted advertising

Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …

Fake, malicious World Cup-themed apps targeting Android users

The 2014 FIFA World Cup in Brazil start today, and Trend Micro researchers have pointed out yet another thing that fans need to be careful about: fake and malicious versions …

Tool for creating booby-trapped PDFs made public

Freelance security researcher Claes Spett has made available a tool he dubbed “PDF Exploit Generator,” which allows penetration testers – but also malicious …

The state of GRX security

Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …

Automatic updating of Android apps becomes riskier

Google has made unwelcome changes to the way new app permissions are disclosed to users: no warnings will be shown if a new permission if is in the same category as an old one …

Microsoft battles US search warrant requesting customer emails stored abroad

Microsoft is battling a search warrant that could have a great impact on the future of US tech companies in the global market. Late last year, a federal magistrate judge in …

Don't miss

Cybersecurity news