Please turn on your JavaScript for this page to function normally.
Money
University pays $20,000 in ransomware attack

The ransomware plague has hit the University of Calgary, and the academic institution did what many victims do: they paid the ransom to get the encrypted files back. The …

biohazard
Fake gaming torrents download unwanted apps instead of popular games

If you’re looking for torrents to download pirated copies of popular games, be extra careful not to be tricked into downloading malicious and unwanted software instead. …

usa passport
US-bound travelers looking for a visa might get a RAT instead

F-Secure researchers have discovered that travelers who applied for a US Visa in Switzerland have recently been targeted by cyber-criminals wielding the latest version of the …

LinkedIn attack EU
Stolen LinkedIn data used in malware campaign hitting European users

European LinkedIn users are being targeted with highly personalized malicious emails. It is more than likely that the attackers are misusing the compromised LinkedIn user data …

tools
It takes 248 days for IT businesses to fix their software vulnerabilities

Compiled using data collected from tens of thousands of websites, a new WhiteHat Security report reveals that the majority of web applications exhibit, on average, two or more …

DDoS
Retail, gaming industries hardest hit with web application and DDoS attacks

Akamai published the Q1 2016 State of the Internet – Security Report, which provides a detailed view of the global cloud security threat landscape and in-depth analysis …

programmer
Do companies take customers’ security seriously?

75 percent of adults in the UK would stop doing business with, or would cancel membership to, an organisation if it was hacked. This suggests, however, that a quarter would …

Microsoft logo
Malware exploits BITS to retain foothold on Windows systems

If you’re sure that you have cleaned your system of malware, but you keep seeing malware-related network alerts, it’s possible that at some point you’ve been …

Broken glass
Angler exploit kit bypasses EMET’s defenses

The infamous Angler exploit kit is now capable of bypassing the protections offered by Microsoft’s Enhanced Mitigation Experience Toolkit (EMET), FireEye researchers …

rings
FastPOS malware exfiltrates data immediately after harvesting it

POS malware might have taken a backseat when ransomware became the go-to malware for many cyber crooks, but stealing payment card information to effect fraudulent transactions …

0patch
0patch: Microscopic cures for big security holes

Software vulnerabilities are one of today’s most significant information security issues. Disclosing high profile vulnerabilities has become tremendously rewarding, to the …

tunnel
Proactive threat hunting: Detect, isolate and eradicate

Organizations worldwide wait until they fall victim to a damaging cyber attack before engaging a provider of managed security services, or MSS, according to Raytheon. …

Don't miss

Cybersecurity news