Please turn on your JavaScript for this page to function normally.
Over 1,000 businesses compromised with Backoff malware

The US Department of Homeland Security has once again issued a warning to businesses about the Backoff malware. “The DHS encourages organizations, regardless of size, to …

Bitcoin-themed phishing campaign creates quite a stir

The latest massive email phishing campaign targeting Bitcoin users has had an unexpected click-through rate. The spam campaign came in two waves, and of the 12,000 messages …

Control Android app permissions with NativeWrap

Tired with using mobile apps that demand unneeded permissions that open the door to data collection and worse? Researchers from North Carolina State University have come up …

Extracting encryption keys by measuring computers’ electric potential

A group of researchers from Technion and Tel Aviv University have demonstrated new and unexpected ways to retrieve decryption keys from computers. Their research is …

Critical Delphi and C++Builder VCL library bug found

A buffer overflow vulnerability that could be exploited to execute malicious code has been discovered in the Visual Component Library (VCL) library of Embarcadero’s …

Most popular Android apps open users to MITM attacks

An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be …

Most Facebook email notifications are now encrypted

95% of Facebook’s notification emails are now encrypted with both Perfect Forward Secrecy and strict certificate validation, Michael Adkins, a Messaging Integrity …

Reveton ransomware now comes with password stealers

The Reveton screen-locking ransomware is still with us, and it’s evolving. According to Avast researchers, the latest generation of the malware also includes information …

CHS hackers exploited the Heartbleed bug

The recent massive Community Health Systems breach, which resulted in the compromise of personal information of some 4.5 million patients, was executed by exploiting the …

Analysis reveals many malicious Chrome extensions

An analysis of 48,332 browser extensions from the Chrome web store has revealed 130 outright malicious and 4,712 suspicious extensions, some of which have been downloaded by …

iStorage datAshur Personal
Using the iStorage datAshur Personal secure USB flash drive

The iStorage datAshur Personal is a PIN-activated USB flash drive designed for everyday use, both private and corporate. The drive comes in three sizes: 8GB, 16GB and 32GB.

Coder tries shaming apps and site owners into using HTTPS

How can we force website owners and software developers to start using HTTPS? Coder Tony Webster believes shaming might be the right answer. To that point, he created a …

Don't miss

Cybersecurity news