backdoor
Xiaomi smartphones come equipped with backdoor
When you buy a new mobile device with certain apps already pre-installed on, you’re effectively forced to trust that the device maker or reseller (depending on who …
Sophisticated Mokes backdoor targets Mac users
A new malware targeting Macs has been discovered: the Mokes backdoor. Capable of making screenshots, recording keystrokes, capturing audio, and rifling through Office …
Twitter-controlled Android backdoor delivers banking malware
A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account. Keeping their botnet out of law enforcement’s …
Backdoor uses TeamViewer to spy on victims
A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have …
Top-level cyber espionage group uncovered after years of stealthy attacks
Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile …
European privacy advisor wants encryption without backdoors
“The confidentiality of online communications by individuals and businesses is essential for the functioning of modern societies and economies. The EU rules designed to …
Dell SonicWALL GMS comes with hidden default account
While developing new audit modules for the company’s vulnerability scanning technology, Digital Defense researchers found six vulnerabilities in Dell’s SonicWALL …
Keydnap malware opens backdoor, goes after passwords in OS X keychain
ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap. Keydnap has the ability to steal passwords and keys …
New Mac OS X backdoor disguised as document converter app
Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …
Ubiquiti routers hit by backdoor-generating worm
A worm targeting wireless network equipment developed by US-based Ubiquiti Networks has already managed to compromise thousands of routers across the world. To spread it, …
Tor Project exploring ways to keep its software and users safe
In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …
Carbanak cyber-thieves’ newest attacks exposed
The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments