CoinVault ransomware: Retrieve data without paying the criminals
Victims of the CoinVault ransomware have a chance to retrieve their data without having to pay the criminals, thanks to a repository of decryption keys and a decryption …
Attackers can easily crack Belkin routers’ WPS PINs
A considerable number of routers manufactured by US-based Belkin use a flawed method for creating PINs for Wi-Fi Protected Setup (WPS), making them easily discoverable by …
New security requirements for payment card vendors
The PCI Security Standards Council (PCI SSC) has published version 1.1. of its PCI Card Production Security Requirements. The updated standard helps payment card vendors …
US prohibits Intel to export chips for Chinese supercomputers
US chip maker Intel has been prohibited by the US Department of Commerce to export chips needed to upgrade Chinese supercomputers. The Department determined that “the …
TV5Monde makes new security blunders in wake of hack
Last week’s hack attack against TV5Monde resulted in the compromise of its website, social media accounts, the outage of its email server, and a temporary program …
Are privileged users the most dangerous insider?
92 percent of healthcare IT decision makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49 percent felt very or extremely …
Phishers increasingly target banks and ISP accounts
Phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014, according to the APWG. The number of brands being attacked remains high, …
Simda botnet taken down in global operation
The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation. In a series of simultaneous actions around the …
Man gets 150 months in prison for selling stolen and counterfeit credit cards
A member of the identity theft and credit card fraud ring known as Carder.su was sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards over …
Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach
Here’s an overview of some of last week’s most interesting news and articles: How to protect from threats against USB enabled devices USB can be an effective and …
TorLocker victims can decrypt most files without paying ransom
Crypto-ransomware rarely means good news for targets, but when it comes to TorLocker malware (detected as Trojan-Ransom.Win32.Scraper by Kaspersky Lab), the victims can …
Beware of malicious “Internal ONLY” emails
Malware peddlers are once again trying to trick users into downloading malware by sending out fake emails impersonating domain administrators. The email, with “Internal …
Featured news
Resources
Don't miss
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits
- Weak enforcement keeps PCI DSS compliance low
- Formal proofs expose long standing cracks in DNSSEC
- WatchGuard Firebox firewalls under attack (CVE-2025-14733)
- Docker makes hardened images free open and transparent for everyone