Please turn on your JavaScript for this page to function normally.
Advice on Tor use in wake of Freedom Hosting compromise

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …

Decoy water plant attracts hackers, Chinese APT1 crew

A Trend Micro researcher that has lately concentrated on finding out just how often industrial control systems are attacked and from where has shared the latest findings of …

Cross-platform backdoor created with RAT available online

For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …

Tor users targeted with spyware following anonymous Web-host shutdown

The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …

Working as an ethical hacker

The term “ethical hacker” as it is used today is, if you ask me, somewhat imprecise. After all, a hacker in it for the money could be said to follow his or her own …

FBI uses malware to spy on suspects via their phones

The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …

Engineers demonstrate PLC hack on mock oil rig

The widely known Stuxnet incident made sure that the mere mention of SCADA vulnerabilities is enough for security experts to pause. After all, sabotaging industrial control …

FBI announces cyberattack-reporting portal for private sector companies

The US FBI has launched iGuardian, an online portal for private sector companies that allows them to easily and consistently report to the Bureau any cyber threat or attack …

ZeroAcces rootkit dominates, adds new persistence techniques

According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …

Researchers hack femtocells, record mobile phones’ calls, SMS traffic

Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …

Snowden given asylum by Russia, leaves Moscow airport

NSA whistleblower Edward Snowden has been granted temporary asylum in the Russian Federation and has left the transit zone of Moscow’s Sheremetyevo airport, RT reports. …

All Facebook users get secure browsing by default

After having introduced secure browsing as an option in 2011, and having begun rolling out always-on HTTPS by default for users in North America late last year, Facebook is …

Don't miss

Cybersecurity news