Please turn on your JavaScript for this page to function normally.
healthcare
OpenEMR flaw leaves millions of medical records exposed to attackers

A vulnerability in the free, open source electronic medical record and medical practice management software OpenEMR can be exploited to steal patients’ medical records …

Android smartphone
Safeguard mobile devices: VPNs and personal firewalls are vital

As mobile devices have permeated every aspect of private and professional lives, users have become increasingly dependent on connecting to public hotspots – especially when …

Cisco
Critical flaw in Cisco collaboration products plugged

A critical vulnerability in a dozen Cisco collaboration products based on the Cisco Voice Operating System (VOS) could allow unauthenticated, remote attackers to gain access …

Google Play
Sneaky malware downloader found in apps on Google Play

Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages – a mixture of Android cleaners and …

PTP-RAT
Data exfiltration tool PTP-RAT encodes data in pixel colour values

How to exfiltrate data from a machine that doesn’t have file transfer capabilities or whose Remote Desktop Protocol (RDP) connection has been locked down, making it …

mobile work
The mobile workforce: Productive, but susceptible to data compromise

An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …

GoCrack
FireEye releases open source managed password cracking tool

FireEye has released GoCrack, an open source tool for managing password cracking tasks across multiple machines. “Simply deploy a GoCrack server along with a worker on …

Google Play
Beware fake Android cryptocurrency trading apps on Google Play

Two phishing apps that were made to look like the official app of popular cryptocurrency exchange Poloniex have been booted off Google Play after ESET researchers notified …

Trojan
MacOS Proton backdoor delivered via Trojanized media player app

A Trojanized version of Elmedia Player software for Mac was available for download for who knows how long from the developer’s official site, ESET researchers have …

binary
The pervasive risk of vulnerable open source components

Veracode announced findings from the 2017 State of Software Security Report, a comprehensive review of application security testing data from scans conducted by a base of more …

Google Chrome
ESET helps Google protect Chrome users from unwanted software

Google has redesigned Chrome Cleanup on Chrome for Windows, and has upgraded the technology it uses to detect and remove unwanted software. A basic antivirus for Chrome …

open source
Companies turn a blind eye to open source risk

Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …

Don't miss

Cybersecurity news