How to make public Wi-Fi users mine cryptocurrency for you
Covertly roping unsuspecting users’ machines into mining cryptocurrency is a dream for many aspiring cryptocurrency owners, and some of them set aside ethical …
Cyxtera acquires Immunity Inc.
Cyxtera Technologies has entered into a definitive agreement to acquire privately-held Immunity Inc, a provider in offense-oriented systems vulnerability research, exploit …
CBP releases new guidelines on phone, laptop searches at US borders
Late last week, the US Customs and Border Protection agency released an update to its Directive governing Border Searches of Electronic Devices. According to the new …
Healthcare breaches involving ransomware increase year-over-year
2017 has been a very challenging year for healthcare institutions as these organizations remain under sustained attack by cybercriminals that continue to target their …
Week in review: Meltdown, Spectre, online tracking, and cryptojacking
Here’s an overview of some of last week’s most interesting news and articles: Meltdown and Spectre: Data theft hardware bugs affect most modern CPUs A design flaw …
PyCryptoMiner ropes Linux machines into Monero-mining botnet
A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …
DHS insider breach resulted in theft of personal info of staff and people involved in investigations
The US DHS Office of Inspector General (OIG) has confirmed that the “privacy incident” discovered in May 2017 resulted in the theft of personally identifiable …
Browser makers move to mitigate risk of Spectre browser attacks
Apple has confirmed that it has already pushed out security updates for iOS, macOS and tvOS that mitigate the danger of users being affected by Meltdown attacks. (watchOS did …
Intel issues updates to protect systems from Spectre and Meltdown
Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems – including personal computers and servers – that render those …
Meltdown and Spectre: Data theft hardware bugs affect most modern CPUs
In the wake of yesterday’s news and speculation about a serious design flaw in Intel processors, the security researchers involved in discovering the issue and the …
36 fake security apps removed from Google Play
Google has recently pulled 36 fake security apps from Google Play, after they’ve been flagged by Trend Micro researchers. Posing as legitimate security solutions, and …
80% of smartphones will have on-device AI capabilities by 2022
Artificial intelligence (AI) features will become a critical product differentiator for smartphone vendors that will help them to acquire new customers while retaining current …
Featured news
Resources
Don't miss
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
- Brutus: Open-source credential testing tool for offensive security
- Why secure OT protocols still struggle to catch on
- Edge computing’s biggest lie: “We’ll patch it later”
- Cyber risk is becoming a hold-period problem for private equity firms