Please turn on your JavaScript for this page to function normally.
Law legislation
Hackers breaching law firms for insider trading info

Two of the most prestigious law firms in the US, best known for their financial services and corporate practices, have had their computer networks compromised by hackers. …

payment card
Carders use custom built POS malware to hit US retailers

Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye …

Has your network been compromised? Use RITA to find out

Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious …

Doctor
Cyber onslaught threatens to overwhelm healthcare

Healthcare organizations average about one cyber attack per month, say the result of the recent Ponemon study on the state of cybersecurity in healthcare organizations. Almost …

Terbium Labs
Terbium Labs closes $6.4m in funding for stolen data discovery on Dark Web

Terbium Labs announced at RSA Conference that it has raised $6.4 million in Series A financing led by .406 Ventures, bringing the total raised to $9.7 million. Terbium Labs …

break
DROWN attack breaks TLS encryption, one-third of all HTTPS servers vulnerable

There’s a new attack that breaks the communication encryption provided by SSL and TLS and can therefore lead to theft of extremely sensitive data exchanged between users …

Linux Mint
Linux Mint hack: Backdoored ISOs, stolen forums database

The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …

market
IRS warns of 400 percent surge in tax-related phishing emails

The number of tax related phishing and malware incidents has exploded this US tax season, the US Internal Revenue Service (IRS) has warned on Thursday. All in all, there has …

Android Marshmallow
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer

Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …

Magento
Year-old critical Magento flaw still exploited, payment info stolen

A whole year has passed since a critical e-shop hijacking flaw in the Magento CMS has been patched, but the vulnerability is still being exploited in attacks in the wild, …

money
What’s the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

Bitcoin
Loanbase hacked via WordPress hole, funds stolen

Popular international Bitcoin crowd-lending platform Loanbase has suffered a security breach, and is currently offline. The breach was discovered on Saturday and made public …

Don't miss

Cybersecurity news