Please turn on your JavaScript for this page to function normally.
Pwn2Own 2014: $150,000 for an “exploit unicorn”

There are a few new rules for this years’ edition of the Pwn2Own hacking contest and a huge new prize for an “Exploit Unicorn worthy of myth and legend” …

A solution for fixing hijacked Chrome settings

Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …

How a fake antivirus attack works

Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …

Hackers breach Bell Canada, leak customer info and passwords

The hacker group NullCrew has managed to access servers belonging to Bell Canada – or a third-party supplier, as Bell claims – and steal and ultimately leak …

PoC mobile malware records swipes on touch screen smartphones

A security researcher has developed proof-of-concept malware capable of capturing screenshots and finger swipes on mobile devices, and is set to demonstrate his creation at …

Canadian spy agency used free airport WiFi to track travelers

A new report based on documents provided by NSA whistleblower Edward Snowden will make Canadians question whether the country’s electronic spy agency does, as it claims, …

Researchers uncover months-old POS malware botnet

With the Target and Neiman Marcus breach being all over the news in the last few weeks, the topic of malware that collects card data directly from Point-of-Sale devices has …

Yahoo Mail accounts compromised in coordinated attack

Unknown attackers have attempted to access a number of Yahoo Mail accounts, the company warned on Thursday, and urged users to change their passwords even if they …

GitHub sets up bug bounty program

GitHub is the latest service to announce that they have started a security bug bounty program. “The idea is simple: hackers and security researchers find and report …

Beware of bogus Google “Suspicious sign-in prevented” emails

A very convincing phishing attempt aimed at harvesting users’ Google account credentials has been spotted by a security researcher (click on the screenshot to enlarge …

How to recover deleted or corrupted digital currency

The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …

“Honey Encryption” overwhelms attackers with fake results

Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …

Don't miss

Cybersecurity news