Please turn on your JavaScript for this page to function normally.
Hands
Fraudsters loot W-2 data stored by Equifax

Equifax, one of the big-three US credit bureaus, has been targeted by fraudsters that search for W-2 data and use it for claiming fraudulent tax returns. But the company …

tax
Fraudsters steal tax data from ADP customer portal

ADP has confirmed identity thieves managed to access W-2 data of a number of its customers’ employees through the company’s customer portal, but says that the …

Gozi malware creator sentenced to time served

Nikita Kuzmin, the creator of the Gozi malware, was sentenced on Monday in Manhattan federal court to time served (37 months). He was also ordered to pay nearly $7 million in …

Android
Screen overlay Android malware is on the rise

As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in …

Mexico fingerprint
Info on 93 million Mexican voters found on an Amazon cloud server

Sensitive personal information of over 93 million Mexican voters has been found, unprotected and accessible to anyone who knew where to look. Last Friday, researcher Chris …

abstract lights
Public institutions targeted with shape changing Qbot malware

A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations …

Law legislation
Hackers breaching law firms for insider trading info

Two of the most prestigious law firms in the US, best known for their financial services and corporate practices, have had their computer networks compromised by hackers. …

payment card
Carders use custom built POS malware to hit US retailers

Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye …

Has your network been compromised? Use RITA to find out

Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious …

Doctor
Cyber onslaught threatens to overwhelm healthcare

Healthcare organizations average about one cyber attack per month, say the result of the recent Ponemon study on the state of cybersecurity in healthcare organizations. Almost …

Terbium Labs
Terbium Labs closes $6.4m in funding for stolen data discovery on Dark Web

Terbium Labs announced at RSA Conference that it has raised $6.4 million in Series A financing led by .406 Ventures, bringing the total raised to $9.7 million. Terbium Labs …

break
DROWN attack breaks TLS encryption, one-third of all HTTPS servers vulnerable

There’s a new attack that breaks the communication encryption provided by SSL and TLS and can therefore lead to theft of extremely sensitive data exchanged between users …

Don't miss

Cybersecurity news