Please turn on your JavaScript for this page to function normally.
Global action takes down Darkode cybercriminal forum

This week, law enforcement and judicial authorities worldwide have taken down the most prolific English-speaking cybercriminal forum to date: Darkode.In an international …

SanDisk unveils new wireless flash drive

SanDisk unveiled a new wireless mobile flash drive, the SanDisk Connect Wireless Stick, which enables sharing, transferring and accessing data between mobile devices and …

Researchers prove HTML5 can be used to hide malware

“A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute …

New GamaPoS malware targets US companies

“After dedicating their efforts to swelling the number of computers roped into their malicious net, the masters of the Andromeda botnet are putting it to use by …

Epic Games forums hacked, user data stolen

The forums of popular game development company Epic Games have been hacked, and the users’ username, email address, password and date of birth have likely been …

Coalition for Responsible Cybersecurity fights proposed export control regulations

A broad cross-section of industry announced the formation of the Coalition for Responsible Cybersecurity. The purpose of the Coalition is to prevent the Commerce Department …

Hacking Team spyware survives on target systems with help of UEFI BIOS rootkit

How did Hacking Team make sure that its Remote Control System (RCS) spyware will remain on targets’ computers even if they reinstall their OS, format their hard drives …

Oracle fixes Java zero-day exploited by Pawn Storm hackers

With its quarterly Critical Patch Update, Oracle has released security fixes for 193 vulnerabilities across all of its products (a good summary can be found here), including …

Employees embrace BYOD, but still worry about privacy

The findings of a new survey from Tyntec, based on responses from Spain, the UK and US, reveal sluggish adoption of BYOD policies by organizations, while its employees voice …

Duke APT group adds low-profile SeaDuke Trojan to their malware arsenal

“Not much is known about the cyber espionage group that wields the so-called “Dukes”: backdoors and information stealers that all have “Duke” in …

TeslaCrypt 2.0 makes it impossible to decrypt affected files

“Kaspersky Lab has detected curious behavior in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting …

High severity Internet Explorer 11 vulnerability identified after Hacking Team breach

After analyzing the leaked data from last week’s attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet …

Don't miss

Cybersecurity news