Please turn on your JavaScript for this page to function normally.
Reactions to Obama’s Executive Order on cybersecurity

On February 12, we have witnessed U.S. President Barack Obama sign an Executive Order and issue a Presidential Policy Directive aimed at improving the cybersecurity of …

LA Times website redirected users to exploit kit for over six weeks

A sub-domain of Los Angeles Times’ website has been redirecting visitors to compromised websites hosting the latest version of the Blackhole exploit kit for over six …

Adobe offers mitigation for Reader 0-day attack, fix is yet to come

Adobe has confirmed FireEye researchers’ findings about new Adobe Reader and Acrobat zero-day vulnerabilities being exploited in the wild and has issued a security …

TDoS-as-a-service ads pop up on publicly accessible forums

In the past, aspiring cybercriminals with no coding knowledge had to find a way into invite-only underground forums or had to spend hours in chat rooms to gain the trust of …

Cryptome site, Twitter and email account hacked again

Cryptome, the well-known online repository of documents concerning cryptography, freedom of speech, spying, and surveillance, has been hacked again on Monday night, says the …

Hackers pollute legitimate JavaScript code to spread malware

Most hackers have stopped creating malicious sites long ago and have reverted to hacking legitimate ones and booby-trapping them with exploit kits, malware or malicious …

Adobe Reader zero-day exploit spotted in the wild

Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader. “Upon successful exploitation, it …

Flickr bug made users’ private photos public

A glitch in the Flickr matrix has resulted in intimate photos of a number of its users being made available for everyone to see after their permissions turned from …

Mega pays out first batch of bounties, its crypto still intact

Mega, the file hosting service and successor to Megaupload founded by Kim Dotcom, recently instituted a bug bounty program that should help keep the service and its users safe …

Comment Group hackers specialize in high-profile targeted attacks

It is common knowledge that spear-phishing has become the preferred way for persistent attackers to gain a foothold in targeted systems and network. In fact, most of the …

Malware authors revert to phishing approach to trick bank defenses

Banking malware that performs Man-in-The-Browser tricks such as injecting legitimate banking sites with additional forms, hijacking the authenticated session to add a new …

Citi Group customers targeted with malware-laden alerts

A malware-spreading spam campaign targeting Citi Group customers is underway, so if you are one, be on the lookout for an email alerting you to the receipt of a “secure …

Don't miss

Cybersecurity news