Please turn on your JavaScript for this page to function normally.
Critical vulnerability in RealTek SDK breaks routers’ security

A critical vulnerability in version 1.3 of the RealTek software development kit (SDK) has opened hole in D-Link and Trendnet Wi-Fi routers – and possibly many others, as …

Chrome extension protects your Google account from phishers

Google developers have created Password Alert, an open source Chrome extension that aims to prevent users from entering their Google password in a phishing site or, …

93% of DDoS attacks last 30 minutes

As the tide of DDoS attacks continues to expand, the rise of the Internet of Things (IoT) and the influx of network connected devices, such as webcams and routers, are leading …

Unpatched, vulnerable PDF readers leave users open to attack

Unpatched, vulnerable PDF readers are a big security issue for private PC users, according to Secunia. 14% of PC users in the US (up from 12.9% last quarter) have an unpatched …

Crypt0L0cker ransomware avoids US computers

“Yet another piece of ransomware has surfaced, and this one has several interesting things about it: it expressly avoids targeting US users, and it has a hardcoded list …

5,000+ e-commerce sites at risk due to buggy WordPress plugin

A popular WordPress e-commerce plugin that is actively used on over 5,000 websites contains high-risk vulnerabilities that can be exploited to compromise customers’ …

Fraudsters steal millions from Ryanair account

Fraudsters have apparently managed to syphon some 4.5 million euros (about $5 million) out of a bank account belonging to Ryanair, Europe’s biggest low-cost …

Tor Browser 4.5. is out, with new security and privacy upgrades

The Tor Project has released version 4.5 of its popular Tor Browser, and this new version comes with a number of security and privacy improvements.Users can now use a Security …

Why you should steer users towards less predictable passwords

As users are instructed to create ever more complex passwords, and developers are starting to use encryption methods more difficult to crack than standard hashing functions, …

Hacker exploits Android devices with self-implanted NFC chip

A security researcher has demonstrated that it’s possible to implant yourself with a NFC chip that will not be detected by body scanners at airports or other …

Threats on government networks remain undetected for 16 days

Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight.The good …

High volume DDoS attacks still persistent

Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally.In …

Don't miss

Cybersecurity news