Please turn on your JavaScript for this page to function normally.
GameOver Zeus gang boss also engaged in cyber espionage

Cyber crooks and cyber spies are often two distinct categories of attackers, but not always. Years-long research by the FBI, Fox-IT and Crowdstrike revealed that, at least in …

Zero-day disclosure-to-weaponization period cut in half

There’s no doubt about it: the batch of stolen information leaked in the wake of the Hacking Team breach was a boon for exploit kit developers.Not only did it contain a …

Android users rejoice! Security updates will be coming out faster

August 5, 2015, is the date that (hopefully) marks the beginning of one of the biggest positive changes in the Android ecosystem.Adrian Ludwig, Google’s lead engineer …

Corporate networks can be compromised via Windows Updates

Yesterday at Black Hat USA 2015, researchers from UK-based Context Information Security demonstrated how Windows Update can be abused for internal attacks on corporate …

Microsoft expands Bug Bounty programs, increases rewards

Microsoft is continually tweaking its Bug Bounty programs, and the latest step in this evolution has been announced on Wednesday at Black Hat USA 2015.“We are raising …

Identify and track sensitive corporate data in real-time

InfoGPS Networks revealed at Black Hat USA 2015 software able to identify, classify, and track sensitive data in real-time across the organization. “Cybersecurity software has …

Photo gallery: Black Hat USA 2015 Business Hall

The Black Hat USA 2015 conference is underway at the Mandalay Bay Convention Center in Las Vegas, and the “business” part of the conference is bustling. Featured …

Global hacker competition challenges penetration testers

More than 500 players have registered for an exciting global online hacker challenge taking place this week during Black Hat USA 2015 and DEF CON.Organized by BalaBit, best …

NIST releases SHA-3 cryptographic hash standard

The National Institute of Standards and Technology (NIST) has released the final version of its “Secure Hash Algorithm-3” standard, a next-generation tool for …

Attackers use Google Drive, Dropbox to breach companies

A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …

Qualys announces free global asset inventory service

At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on …

Phishing attacks targeting businesses are escalating

Phishing attacks have increased by 38 percent overall in Q2 2015, and the growth has been spurred partly by the ever-growing number and sophisticated types of phishing attacks …

Don't miss

Cybersecurity news