Please turn on your JavaScript for this page to function normally.
password
32m Twitter login credentials stolen from users

Leaked Source has added 32,888,300 records of Twitter users to its repository of leaked data. The source of the batch is a user who goes by the alias …

Money
University pays $20,000 in ransomware attack

The ransomware plague has hit the University of Calgary, and the academic institution did what many victims do: they paid the ransom to get the encrypted files back. The …

usa passport
US-bound travelers looking for a visa might get a RAT instead

F-Secure researchers have discovered that travelers who applied for a US Visa in Switzerland have recently been targeted by cyber-criminals wielding the latest version of the …

LinkedIn attack EU
Stolen LinkedIn data used in malware campaign hitting European users

European LinkedIn users are being targeted with highly personalized malicious emails. It is more than likely that the attackers are misusing the compromised LinkedIn user data …

Microsoft logo
Malware exploits BITS to retain foothold on Windows systems

If you’re sure that you have cleaned your system of malware, but you keep seeing malware-related network alerts, it’s possible that at some point you’ve been …

rings
FastPOS malware exfiltrates data immediately after harvesting it

POS malware might have taken a backseat when ransomware became the go-to malware for many cyber crooks, but stealing payment card information to effect fraudulent transactions …

bomb
789% year-over-year spike in malware and phishing

An analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the …

Biohazard
Unsurprisingly, malware incidents set to grow

Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …

Industry
ICS-focused IRONGATE malware has some interesting tricks up its sleeve

FireEye researchers discovered a malware family that’s obviously meant to target ICS systems, but found no evidence that it was ever used in the wild. They were unable …

GitHub
Malware devs scour GitHub for new ideas for bypassing Android security

Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the …

success
Five tips to avoid getting hit by ransomware

Ransomware has emerged as the predominant online security threat to home users and small businesses. Delivered through spam or phishing emails that trick users into clicking …

skull
ZCryptor ransomware spreads via removable drives

The newly spotted ZCryptor ransomware has also the ability to spread like a worm, Microsoft warns. Once it infects a system, it also copies itself on removable drives, in the …

Don't miss

Cybersecurity news