Scandinavian users hit with fake post office emails, ransomware
“Scandinavian PC users are the latest group to be targeted with Cryptolocker ransomware. According to Heimdal Security, the threat comes via email. The malware peddlers …
GreenDispenser malware makes ATMs spit out cash
“A new type of malware is being used to drain ATMs in Mexico of all the cash they contain. Dubbed GreenDispenser by Proofpoint researchers, the malware displays an …
Cisco releases tool for detecting malicious router implants
“Cisco Systems has provided a tool that allows enterprise users to scan their networks and discover if their routers have been compromised with malicious SYNful Knock …
Vulnerabilities in security software leave users open to attacks
In most people’s minds, antivirus and security software equals better security. But thanks to security researchers who have taken it upon themselves to analyze some of …
The number of fingerprints stolen in OPM hack rose to 5.6 million
Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …
CUJO: Plug-n-play protection for all devices
CUJO is a smart device that brings business level Internet security to guard all of your connected home devices. It’s simple to start with no installation necessary.You …
Healthcare industry sees 340% more security incidents than the average industry
Raytheon|Websense examined the current state of cyber threats and data-stealing attacks against an increasingly digital healthcare industry. Healthcare is highly-targeted and …
Free WordPress plugin for a password-free login
Nearly 25 percent of the Internet runs on WordPress, and now these sites can be more secure thanks to a free WordPress plugin available from LaunchKey.The plugin enables …
Chinese promotion company hijacks Android devices around the world
“A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this …
Apple tackles the XcodeGhost crisis by removing apps, alerting devs and users
“The XcodeGhost incident has demonstrated that however secure a system is thought to be, there’s always a way in. It also shows how the very human tendency of …
Using external URL shorteners for internal needs may lead to sensitive data leaks
Using external URL shortener services to create better-looking links to internal company documents, sensitive files and internal websites is a practice that company employees …
Killing computer infrastructures with a bang!
In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?