Please turn on your JavaScript for this page to function normally.
GreenDispenser malware makes ATMs spit out cash

“A new type of malware is being used to drain ATMs in Mexico of all the cash they contain. Dubbed GreenDispenser by Proofpoint researchers, the malware displays an …

Cisco releases tool for detecting malicious router implants

“Cisco Systems has provided a tool that allows enterprise users to scan their networks and discover if their routers have been compromised with malicious SYNful Knock …

Vulnerabilities in security software leave users open to attacks

In most people’s minds, antivirus and security software equals better security. But thanks to security researchers who have taken it upon themselves to analyze some of …

The number of fingerprints stolen in OPM hack rose to 5.6 million

Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …

CUJO: Plug-n-play protection for all devices

CUJO is a smart device that brings business level Internet security to guard all of your connected home devices. It’s simple to start with no installation necessary.You …

Healthcare industry sees 340% more security incidents than the average industry

Raytheon|Websense examined the current state of cyber threats and data-stealing attacks against an increasingly digital healthcare industry. Healthcare is highly-targeted and …

Free WordPress plugin for a password-free login

Nearly 25 percent of the Internet runs on WordPress, and now these sites can be more secure thanks to a free WordPress plugin available from LaunchKey.The plugin enables …

Chinese promotion company hijacks Android devices around the world

“A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this …

Apple tackles the XcodeGhost crisis by removing apps, alerting devs and users

“The XcodeGhost incident has demonstrated that however secure a system is thought to be, there’s always a way in. It also shows how the very human tendency of …

Using external URL shorteners for internal needs may lead to sensitive data leaks

Using external URL shortener services to create better-looking links to internal company documents, sensitive files and internal websites is a practice that company employees …

Killing computer infrastructures with a bang!

In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …

WD My Cloud NAS devices can be hijacked by attackers

Researchers with security consultancy VerSprite have unearthed several vulnerabilities in Western Digital’s My Cloud NAS product, which can be exploited by local and …

Don't miss

Cybersecurity news