Exploiting vulnerabilities in media players to spread advanced malware
Trusteer’s research has shown that vulnerable media players are constantly targeted by malicious actors. Since in most environments media players exist on users’ …
EU sets huge fines for firms who violate users’ privacy
MEPs inserted stronger safeguards for EU citizens’ personal data that gets transferred to non-EU countries in a major overhaul of the EU’s data protection laws …
US announces transition of oversight over Internet’s domain name system
The US Commerce Department’s National Telecommunications and Information Administration (NTIA) announced its intent to transition key Internet domain name functions to …
New authenticated encryption algorithm is resistant to multiple misuse
Nippon Telegraph and Telephone Corporation, Mitsubishi Electric Corporation and the University of Fukui have jointly developed an authenticated encryption algorithm offering …
Week in review: Target breach reaction fail, WordPress sites exploited in DDoS attack
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Latvia establishes a Cyber Defence Unit The newly …
“Malaysian Airlines flight MH370 found” video is a scam
Cyber scammers are misusing the public’s interest in the fate of the recently disappeared plane on Malaysia Airlines flight MH370 to lure users into filling in online …
Target failed to act on malware alerts and signs of breach
The massive Target data breach could have easily been prevented if only its IT team had the good sense to thoroughly check out the alerts it received from the $1.6 million …
Tax-related identity theft will rise
Tax-related identity theft has been on the rise for years and the ITRC predicts it won’t be slowing down in 2014. The Javelin Strategy & Research 2014 Identity …
Pwn2Own 2014 ends, $850k distributed to successful hackers
Day two of the Pwn2Own hacking contest at the CanSecWest Conference in Vancouver has ended with Safari, Internet Explorer, Firefox, Chrome and Flash going down. The Vupen team …
Beware of well-executed Google Docs phishing scam
An extremely convincing phishing spam campaign is currently targeting Google Docs and Google Drive users. It all starts with an email that tells potential victims that an …
GFI WirelessSentry brings Wi-Fi management to SMBs
GFI Software unveiled GFI WirelessSentry (GFI WiSe), a cloud-based solution designed to allow IT administrators to monitor, manage and secure their wireless networks. GFI WiSe …
Backdoor in Samsung Galaxy devices discovered
The developers of Replicant, a “fully free/libre version of Android”, have discovered a backdoor in a number of Samsung Galaxy devices that could allow attackers …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring