Please turn on your JavaScript for this page to function normally.
bomb
789% year-over-year spike in malware and phishing

An analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the …

VK
100 milion VK accounts put up for sale

Another “historic” mega breach has been revealed as someone who goes by the alias “Tessa88@exploit.im” has begun selling info tied to 100 milion VK …

Mitsubishi PHEV
Researchers hack the Mitsubishi Outlander SUV, shut off alarm remotely

Mitsubishi Outlander, a popular hybrid SUV sold around the world, can be easily broken into by attackers exploiting security weaknesses in the setup that allows the car to be …

badblock
Destructive BadBlock ransomware can be foiled

If you have been hit with ransomware, you want that malware to be BadBlock – but only if you haven’t restarted your computer. This particular malware is a …

Biohazard
Unsurprisingly, malware incidents set to grow

Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …

Abstract
Week in review: Windows 0day for sale, and lessons learned from 17 years as an infosec trainer

Here’s an overview of some of last week’s most interesting news, reviews and articles: ICS-focused IRONGATE malware has some interesting tricks up its sleeve …

Industry
ICS-focused IRONGATE malware has some interesting tricks up its sleeve

FireEye researchers discovered a malware family that’s obviously meant to target ICS systems, but found no evidence that it was ever used in the wild. They were unable …

GitHub
Malware devs scour GitHub for new ideas for bypassing Android security

Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the …

Lenovo
Lenovo tells users to uninstall vulnerable Accelerator app

In the wake of Duo Security’s report on the critical vulnerabilities sported by Original Equipment Manufacturer (OEM) updaters loaded on popular laptop and desktop …

touchscreen
Surprise! Most IoT products have inadequate security

While the IoT era of products brings innumerable advances and modern conveniences to the lives of consumers, the connected nature of these products creates unintentional ports …

bridge
Are you prepared for future information management requirements?

While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …

Google Chrome
Google Chrome update includes 15 security fixes

Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …

Don't miss

Cybersecurity news