Please turn on your JavaScript for this page to function normally.
users
Security skills need to be deep and wide to mitigate critical risks

Businesses recognize security as a growing imperative, but many remain on the defensive, fighting cyber threats with dated tactics and training, according to CompTIA. …

BrickerBot bricked 2 million IoT devices, its author claims

The author of BrickerBot, which “bricks” IoT devices by rewriting the flash storage space and wiping files, has emerged to explain that the malware first attempts …

Locky ransomware makes a comeback, courtesy of Necurs botnet

The Necurs botnet has, once again, begun pushing Locky ransomware on unsuspecting victims. The botnet, which flip-flops from sending penny stock pump-and-dump emails to …

NSA
Tens of thousands Windows systems implanted with NSA’s DoublePulsar

Has your Windows machine been implanted with NSA’s DoublePulsar backdoor? If you haven’t implemented the security updates released by Microsoft in March, chances …

botnet
Alleged Kelihos botmaster indicted

36-year-old Pyotr Levashov was charged on Friday in the US with one count of causing intentional damage to a protected computer, one count of conspiracy, one count of …

prison
Russian carding industry pioneer sentenced to 27 years in prison

32-year-old Roman Valeryevich Seleznev, aka Track2, has been handed the longest US hacking sentence to date: 27 years in prison. He was convicted in August 2016, of 38 counts …

abstract, generic
Week in review: Open source security threats, secure C++ coding

Here’s an overview of some of last week’s most interesting news and articles: Will blockchain liability be similar to Bitcoin liability? Blockchain can be used for …

hand
What motivates youngsters to get into cybercrime?

A UK National Crime Agency report, which is based on debriefs with offenders and those on the fringes of criminality, explores why young people assessed as unlikely to commit …

PoS
RawPOS malware has new data-grabbing capabilities

RawPOS continues to evolve, and has recently been equipped with the capability to steal data contained in the victims’ driver’s license’s 2-dimensional …

Magnify
Top-ranked programming Web tutorials introduce vulnerabilities into software

Researchers from several German universities have checked the PHP codebases of over 64,000 projects on GitHub, and found 117 vulnerabilities that they believe have been …

Be careful on Google Play

An often repeated piece of advice given to users of mobile devices says that they should stick to well-reputed, official app stores if they want to avoid malware. But while …

decision
A third of employees say it’s common to take corporate data with them when leaving a company

Today’s workforce is caught between two imperatives: be productive and efficient on the job and maintain the security of company data. The results of a recent end-user …

Don't miss

Cybersecurity news