Please turn on your JavaScript for this page to function normally.
64-bit Zeus Trojan version found and analyzed

Infamous banking Trojan Zeus can now be used to steal information via 64-bit versions of web browsers, and has the capability of connecting to its C&C server via the Tor …

What do people want to hide on their smartphone?

More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …

How cyber squatters and phishers target antivirus vendors

Illegal online activities such as phishing and typosquatting are growing at an alarming rate. To understand the issue in detail High-Tech Bridge analyzed 946 domains that may …

Young professionals exposing workplaces to cyber attack

Low cyber-threat awareness amongst Gen-Y professionals coupled with blasé attitudes towards cyber security are leaving organizations across the country exposed to attack and …

Flawed Android app devkit puts users in danger of MitM attacks

In this age of prevalently free software and services, it’s difficult to make users pay for apps, and especially so in the Android ecosystem. Consequently, mobile app …

Energy-efficient bcrypt cracking

Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …

Security is the biggest obstacle for moving data to Office 365

CipherPoint revealed the findings of its first State of Collaboration Security Report highlighting security issues with collaboration platforms such as Microsoft SharePoint, …

NSA uses Google cookies to track and target suspects

Newly published documents from Edward Snowden’s trove show that the NSA and its British counterpart GCHQ use Google’s “preferences” cookies to follow …

RAT-wielding attacker compromises poker player’s laptop

The laptop of a high-profile Finnish poker player has been found to contain spying malware after the device was stolen from and then returned to his room in a 5-star hotel in …

Deplorable security flaws in Santander UK banking apps and site

When banks urge customers to use their mobile banking apps and sites for making online payments, users usually assume these methods are secure and do so. But Paul Moore, a …

Android malware places secret calls to premium rate numbers

A mobile malware family dubbed MouaBad by Lookout researchers has lately been plaguing Chinese users with older versions (3.1 and earlier) of Android. Variants of the malware …

Tales of passwords, cyber-criminals and daily used devices

Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …

Don't miss

Cybersecurity news