List of articles - Úvod  Seznam   

 

Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Crypto  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus

Datum

Název

Kategorie

 

(IN)SECURE Magazine

Magazine

 

 Phishing campaign leveraging on Dropbox targets Hong Kong media

Phishing

 

 The US military is still sending un-encrypted emails

Kryptografie

17.9.2015

​SYNful Knock: Backdoor Malware Found in Cisco Routers

Virus

10.8.2015

"Certifi-Gate" Android Vulnerability Lets Hackers Take Complete Control of Your Device

Android

8.5.2017

"Fatboy" Ransomware-as-a-Service Sets Ransom Based on Victim Location 

Ransomware

2.5.2017

"Malware Hunter" Helps Researchers Find C&C Servers 

Virus

9.5.2017

#MacronLeaks metadata suggests Russian threat actors behind Macron’s hack

 
 

#opKKK Anonymous denied involvement in recent leak

Hacking

 

#OpNimr Anonymous targets Saudi websites to stop al-Nimr’s crucifixion

Security

 

#ParisAttacks — Anonymous declares War on ISIS: 'We will Hunt you Down!'

ISIS

 

$103,000 stolen in Brain Wallets cracking attacks

Security

 

$17 smartwatch includes a backdoor in the pairing app

Security

 

(IN)SECURE Magazine issue 46 released

Magazine

 

(IN)SECURE Magazine issue 47 released

Magazine

 

(IN)SECURE Magazine issue 48 released

Magazine

 

.onion officially registered as special-use domain name by the IETF

 
 

@FFD8FFDB Twitter bot spies on poorly configured cameras

Social site

 

‘In Our Sites’ Operation seized 999 websites offering counterfeit goods

Hacking

 

‘Prohibition Era’ Of Security Research May Be Ahead

 
 

‘Software Liability Is Inevitable’

 
 

0-days found in widely used Belkin router, fixes still unavailable

 
 

0xHACKED: Brown University Accounts Distributing Phishing Emails

Security

 

1 in 4 organizations have experienced an APT

 
 

10 tips to help organizations stay secure this holiday season

 
 

10% of enterprises have at least one compromised device

 
 

100,000 laptops and phones left in UK bars each year

 

10.9.2015

11 Million Ashley Madison Passwords Cracked In Just 10 Days 

Hacking

 

11 zero-days uncovered in Samsung Galaxy S6 Edge

 
 

13 million MacKeeper users exposed in data breach

 
 

13 Million MacKeeper Users Hacked — 21 GB of Data Exposed

Hacking

 

130 Celebrities' Email Accounts Hacked; Hacker Stole Movie Scripts and Sex Tapes

REPORTS

 

137 major incidents disrupted EU telephony and Internet access in 2014

 
 

15-year-old Boy Arrested in connection with TalkTalk Cyber Attack

Hacking

 

15-Year-Old has been identified and arrested for TalkTalk Attack

Hacking

 

15-year-old Teenage Hacker Arrested Over FBI Computer Hack

Hacking

 

18,000 Android Apps include SMS stealing Library

Android

 

191 Million US Voters' Personal Info Exposed by Misconfigured Database

Security

 

19-Year-Old Teen Steals $150,000 by Hacking into Airline's Website

Crime

 

1-Click Way to Check If your Android Device is Vulnerable to Hacking

Android

 

200 Million WhatsApp Users Vulnerable to vCard Vulnerability 

Vulnerebility

9.9.2015

200 Million WhatsApp Users Vulnerable to vCard Vulnerability 

Vulnerebility

 

200,000 Comcast login credentials available on the Dark Web

Security

 

2015 Cost of Cyber Crime Study

 
 

2015 saw 888 data breaches, 246 million records compromised worldwide

 
 

250+ iOS apps offered on Apple's App Store found slurping user data

 
 

26 vulnerabilities found in parental monitoring application

 
 

26-Year-Old Hacker Sentenced to Record 334 Years in Prison

Hacking

 

27% of all detected malware appeared in 2015

Virus

 

3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Vulnerebility

 

33 percent of all HTTPS websites open to DROWN attack

Computer attack

 

3G/4G cellural USB modems are full of critical security flaws, many 0-days

 
 

3G/4G modems continue to be vulnerable

Vulnerebility

 

3-in-1 solution for enterprise management of privileged accounts and info

 
 

4 in 10 midsize businesses have experienced a data breach

 
 

40% of companies expect a data breach next year

 
 

49 new Regin backdoor modules discovered

 
 

49 suspected members of cybercriminal group arrested in Europe

 
 

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

Crime

 

5 reasons Security Congress is the (ISC)2 member event of the year

 
 

5.6 Million Federal Employees' Fingerprints Stolen in OPM Hack

Crime

 

5.6 Million Fingerprints Stolen In OPM Hack

 
 

500 million users at risk of compromise via unpatched WinRAR bug

 
 

6.4 billion connected things will be in use in 2016

 
 

600TB of data exposed due to misconfigured MongoDB instances

 
 

602 Gbps! This May Have Been the Largest DDoS Attack in History

Computer attack

 

63% in favor of encryption backdoors to respond to national security threats

 
 

65,000+ Land Rovers recalled due to software bug

 
 

7 key global DDoS trends revealed

 
 

7 years of Android: A painful journey to world dominance

Android

 

70% of breaches are detected by a third-party

 
 

74% organizations think they will be hit by an APT in the near future

Security

 

75% of companies experienced a fraud incident in the past year

 
 

8 key online fraud behaviors and patterns

 
 

81% of healthcare organizations have been compromised

 
 

86% of PHP-based apps contain at least one XSS vulnerability

 
 

86.2 million phone scam calls delivered each month in the U.S.

 
 

87% of Android smartphones are insecure and that’s no joke

Android

 

88 percent of company networks vulnerable to privileged account hacks

REPORTS

 

88% of Android devices vulnerable due to slow patch management

Android

 

90% of companies benefit from Big Data

 
 

90% of directors believe regulators should hold firms liable for hacks

 
 

90% of large businesses in the UK experienced data breach

Security

 

9271 crucial vulnerabilities found in 185 firmware images of embedded devices

 
 

95% of websites in 10 new TLDs are suspicious

 
 

A billion Android devices vulnerable to Stagefright 2.0 bugs

Android

 

A critical RCE flaw in Intel Management Engine affects Intel enterprise PCs dates back 9 years

 
 

A day attack with DDoS booter cost $60 and can cause $720k in damage

Computer attack

 

A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

Hacking

 

A few hours the Paris attacks, a new ISIS propaganda hub appeared on the Darknet

ISIS

 

A flaw in CISCO Universal Small Cell allows firmware retrieval

Vulnerebility

 

A flaw in D-Link Switches opens corporate networks to hack

Vulnerebility

 

A flaw in TeslaCrypt ransomware allows file recovering

Virus

 

A FOP data dump leaked online, 2.5GB of police contracts and data

Security

 

A Fourth Teenager was arrested over TalkTalk data breach

Hacking

 

A fundamental shift in security spending

 
 

A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?

 
 

A journalist has been hacked on a plane while writing an Apple-FBI story

Apple

 

A look at North Korea’s ‘paranoid’ Red Star OS computer operating system

OS

 

A new Drydex campaign targeted British businesses

Virus

 

A new emergency patch for Adobe Flash Zero-Day, update your system!

Vulnerebility

 

A new person is leaking confidential documents on the US drone wars

Security

 

A new wave of attacks linked to the Codoso ATP Group

Computer attack

 

A new, streamlined version of Cryptowall is doing rounds

 
 

A replica of AlphaBay market used to steal login credentials

Security

 

A research team has found two flaws in the OAuth 2.0 protocol

Vulnerebility

 

A secret cellphone spying devices catalog leaked online

Hardware

 

A serious issue in Steam allowed access to other users’ accounts

Hacking

 

A severe flaw in OpenSSL allows hackers to decrypt HTTPS traffic

Hacking

 

A severe vulnerability affects eBay, be careful to phishing attacks

Computer attack

 

A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers

 
 

A software bug caused the early release of 3,200 US prisoners

Vulnerebility

 

A sophisticated variant of OceanLotus trojan targets OS X systems

Apple

 

A Step-by-Step Guide — How to Install Free SSL Certificate On Your Website

Security

 

A Turkish hacker scores a record jail sentence of 334 years

Hacking

 

A well-funded cyber criminal group targets Asian organizations

Hacking

 

A XSS may have exposed users of the eBay website to phishing attacks

Computer attack

 

A young hacker violated the CIA Director’s private AOL email

Hacking

 

Abysmal security practices by toy maker VTech result in massive data breach

 
 

Access Private Photos and Contacts Without a Passcode on iOS 9 devices

Apple

 

Account recovery via secret questions is a bad idea

 
 

Actor using Angler exploit kit switched to Neutrino

Hacking

 

AdBlock Extension has been Sold to an 'Unknown Buyer'

Technologies

 

Admedia attacks now rely also on Joomla to serve ransomware

Virus

 

Adobe fixes critical and important flaws in Flash Player and Experience Manager

 
 

Adobe fixes dozens critical vulnerabilities in Flash Player

Vulnerebility

 

Adobe Flash Update Includes Patches for 17 Vulnerabilities

 
 

Adobe Hotfix Patches XXE Vulnerability in ColdFusion

 
 

Adobe Patches 23 Critical Vulnerabilities in Flash Player 

 
 

Adobe Patches 69 Vulnerabilities in Reader, Acrobat, Flash 

 
 

Adobe Patches Flaws in Flash Player, Experience Manager 

 
 

Adobe patches Hacking Team Flash zero-days, update immediately!

 
 

Adobe Patches Two Shockwave Player Vulnerabilities

 
 

Adobe Patches XXE Vulnerability in LiveCycle Data Services

 
 

Adobe Releases 23 Security Updates for Flash Player

Vulnerebility

 

Adobe to Kill 'FLASH', but by Just Renaming it as 'Adobe Animate CC'

Security

 

Adobe to Patch Reader and Acrobat Next Week

 
 

AdobeWorkgroupHelper 2.8.3.3 - Stack Based Buffer Overflow 

 
 

Advantech Clears Hard-Coded SSH Keys from EKI Switches

 
 

Adware installer gives itself permission to access Mac users' keychain

 
 

Aerospace Probes released to stratosphere for spying weapons

Technologies

 

Aethra botnet made up of 12000 Italian devices threatens businesses

Security

 

After two fixes, OAuth standard deemed secure

 
 

Aggressive Android ransomware spreading in the USA

Android

 

Aggressive tactics from DD4BC extortionist group revealed

 
 

AirDrop Bug in Apple iOS and OSX allows Hackers to Install Malware Silently

Apple

 

Akamai and Trustwave unite to protect businesses from online threats

 
 

ALERT: This New Ransomware Steals Passwords Before Encrypting Files

Virus

 

AlienSpy RAT Resurfaces as JSocket

 
 

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

Hardware

 

All BBC Websites went down after a major DDoS attack

Hacking

 

All Versions of Windows affected by Critical Security Vulnerability

Vulnerebility

 

Alleged LulzSec member claims responsibility for the DDoS on TalkTalk

Hacking

 

Allegedly 40 apps on App Store are infected

Apple

 

Amaq, the new ISIS Android App for secure communications

ISIS

 

Amazon Inspector Addresses Compliance and Security Challenge

 
 

Amazon launches AWS web application firewall

 
 

Amazon resets customers' potentially compromised passwords 

 
 

Amazon used as bait

Security

 

America’s Thrift Stores breached by Eastern European criminals

 
 

An Amazon employee became owner of Google.com for a few minutes

Technologies

 

An Army of Thousands of Hacked Servers Found Mining Cryptocurrencies

 
 

Analytics services are tracking users via Chrome extensions

 
 

Analyzing Ransom32, the first JavaScript ransomware variant

Virus

 

Anarchist operation, US and UK spied on Israeli UAVs and fighter jets

Cyber Attack

 

and the most sophisticated Android malware ever exposed

 
 

Android 5 bug allows attackers to easily unlock password-protected devices

 
 

Android adware tricks users into giving it power to secretly download other apps

 
 

Android banking malware SlemBunk continues to evolve

Android

 

Android factory reset not enough to keep data secure

 
 

Android ransomware gets new, professional look thanks to Google’s Material Design

Android

 

Android ransomware masquerades as Adult Player app, takes photo of victim

Android

 

Android smartphones

 
 

Android Stagefright Exploit Code Released

Android

 

Android Stagefright Exploit Code Released to Public 

 
 

Android Tablets with Pre-loaded Cloudsota malware sold on Amazon

Android

 

Android users rejoice! Security updates will be coming out faster

 
 

Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons

 
 

Angler EK exploits recently patched IE bug to deliver ransomware

Virus

 

Angler exploit kit includes the code of a recent Flash flaw

Security

 

Anonymous Declares War On Donald Trump — #OpTrump

Cyber Attack

 

Anonymous goes after ISIS, aims to expose recruiters and sympathizers

 
 

Anonymous Group Leaks Identities of 1000 KKK Members

Security

 

Anonymous hacked the France’s Ministry of Defense portal CIMD (Centre d’Identification des Materiels de la Defense)

Hacking

 

Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015)

Hacking

 

Anonymous Hacking Group Takes Down 20,000 ISIS Twitter accounts

ISIS

 

Anonymous has taken down 5,500 ISIS accounts

ISIS

 

Anonymous leaked 18GB of data belonging to the Turkish national police

Hacking

 

Anonymous Took Down 20,000 pro-ISIS Twitter accounts

ISIS

 

Anonymous took down several government websites of Saudi Arabia

Hacking

 

Anonymous will reveal names of about 1,000 KKK members

Hacking

 

Another computer system at the Pentagon has been hacked

Hacking

 

Another ISIS Hacker Killed by U.S Drone Strike in Syria

ISIS

 

Another Magento Remote Code Execution Vulnerability

Vulnerebility

 

Another root CA cert with key found on Dell's machines

 
 

Another teenager arrested in connection to TalkTalk hack

 
 

Anti-IS group ‘New World Hackers’ claims BBC website attack

ISIS

 

Antiquated environment and bad security practices aided OPM hackers

 
 

API security becoming a CXO level concern

 
 

Appeals Court Vacates Lower Court’s Decision on National Security Letters

 
 

Apple Addresses Dozens of Vulnerabilities, Embraces Two-Factor Authentication in iOS 9 

Apple

 

Apple App Store suffers its first large-scale attack

Apple

 

Apple Boosts iOS 9 Security with improved Two-Factor Authentication

Apple

 

Apple boots some ad blockers from App Store to protect users' privacy

Apple

 

Apple can access your encrypted iMessages

Apple

 

Apple Can Still Read Your End-to-End Encrypted iMessages

Apple

 

Apple complicates app sideloading in iOS 9 for increased security

Apple

 

Apple confirms Judge unlock a new iPhone is not possible

Apple

 

Apple Could Offer iMessage App for Android

Apple

 

Apple fixes a bucketload of vulnerabilities in everything

Apple

 

Apple fixes serious flaws in the Productivity Apps

Apple

 

Apple Gatekeeper Bypass Opens Door for Malicious Code 

Apple

 

Apple Goes All-In on Privacy

Apple

 

Apple has several apps from the official iOS App Store

Apple

 

Apple hires developer of World's Most Secure Messaging App

Apple

 

Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit

Apple

 

Apple iOS Jailbreak Tweaks Have Backdoors; 220,000 iCloud Accounts Hacked

Apple

 

Apple is working on New iPhone Even It Can't Hack

Apple

 

Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store

Apple

 

Apple Mac OS X Hits by Two Unpatched Zero-day Flaws

Apple

 

Apple Patches 100+ Vulnerabilities in OS X, Safari, iOS 

Apple

 

Apple Patches Critical OS X DYLD Flaw in Monster Update

Apple

 

Apple patches serious remotely exploitable iTunes and App Store flaw

Apple

 

Apple pushes out critical security updates for OS X, iOS, watchOS, and other products

Apple

 

Apple releases OS X El Capitan, patches passcode loophole in iOS

Apple

 

Apple releases security updates for every major product

Apple

 

Apple Removes Apps That Expose Encrypted Traffic

Apple

 

Apple removes hundreds of malicious apps after major malware attack

Apple

 

Apple to Built Fuel Cell Battery that Could Power iPhones and Macbooks for Weeks

Apple

 

Apple to Remove 256 iOS Apps Using Private APIs, Collecting Personal Data 

Apple

 

Apple told Judge: It's Impossible to Access Data on Locked iPhones

Apple

 

Apple vs. FBI — Google Joins Tim Cook in Encryption Backdoor Battle

Apple

 

Apple watchOS2 Includes Host of Code-Execution Patches

Apple

 

Apple Zero Day Remains Unpatched

Apple

 

Apple's Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA?

Apple

 

Apple's Mac OS X Still Open to Malware, Thanks Gatekeeper

Apple

 

Apple's Swift programming language is now open source

Apple

 

Approximate machine improves the Bitcoin mining by 30 percent

Technologies

 

APT Group Gets Selective About Data it Steals

APT

 

APT Groups don’t go under the grid after a successful attack!

APT

 

APT Trends report, Q1 2017

APT

 

APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks

APT

 

Arabian tales by ‘Nigerians’

Security

 

Are IT pros overconfident in their ability to deflect attacks?

 
 

Are IT security pros optimistic or naïve?

 
 

Are Russian hackers infecting critical infrastructure in Ukraine?

Cyber Attack

 

Are we putting our finances at risk with our online shopping and banking?

Security

 

Are you ready for EMV?

 
 

Are you searching for a Facebook Hacking Tool? Be careful!

Social site

 

Are your competitors organizing DDoS attacks against you?

 
 

Ashley Madison hacked, info of 37 million users stolen

 
 

Ashley Madison Hacker – An Insider Woman Employee?

Hacking

 

Ashley Madison-themed blackmail, data deletion scams hitting inboxes

 
 

Assassins in the darkweb, “Service catalogue” and Price list” updated

Hacking

 

Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security

Hardware

 

Asus Patches Vulnerabilities in RT Routers 

Vulnerebility

 

AT&T Facilitated NSA Surveillance Efforts, Reports

NSA

 

ATMZombie: banking trojan in Israeli waters

Virus

 

ATP group uses Word Docs to drop BlackEnergy Malware

Virus

 

Attack code for critical Android Stagefright flaw published

 
 

Attack on Zygote: a new twist in the evolution of mobile threats

Mobil

 

Attacker Compromised Mozilla Bug System, Stole Private Vulnerability Data 

 
 

Attackers actively exploiting Windows bug via malicious USB devices

 
 

Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks 

 
 

Attackers can use Siri, Google Now to secretly take over smartphones

 
 

Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks

 
 

Attackers Embracing Steganography to Hide Communication 

 
 

Attackers hack into Outlook Web App (OWA) Server for access to organization network

Computer attack

 

Attackers posing as legitimate insiders still an enormous security risk

 
 

Attackers prefer lower-bandwidth DDoS attacks

 
 

Attackers Replacing Firmware on Cisco Routers

 
 

Attackers take over org's OWA server, harvest domain credentials with malicious DLL

 
 

Attackers use Google Drive, Dropbox to breach companies

 
 

Attacking Diffie-Hellman protocol implementation in the Angler Exploit Kit

Exploit

 

Audit shows Department of Homeland Security 6 billion U.S. Dollar firewall not so effective against hackers

Security

 

Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage?

Security

 

Authentication bypass flaw in Netgear SOHO routers exploited in the wild

 
 

Author of the Angler EK integrated recently Silverlight exploit

Virus

 

Authorities Take Down Darknet Marketplace 

 
 

Authors digitally signed Spymel Trojan to evade detection

Virus

 

AutoIt Used in Targeted Attacks to Move RATs

Virus

30.8.2015

Automating Metrics using RTIR REST API

 
 

AVG Antivirus Plans to Collect & Sell Your Personal Data to Advertisers

Security

 

AVG will sell user browsing and search info to advertisers

 
 

AVG, McAfee, and Kaspersky antivirus were vulnerable to critical flaw

Vulnerebility

 

AV-Test – Which is the best Antivirus for Linux systems?

Virus

 

AV-TEST 2015 AWARDs – Which is the best antivirus solutions?

Security

 

Back to the Future: How much of Marty and Docs' tech is a reality?

 
 

Backdoor In A Backdoor Identified in 600,000 Arris Modems

 
 

Backdoor in Baidu Android SDK Puts 100 Million Devices at Risk

Android

 

BackStab Malware steals iOS and BlackBerry Backups

Virus

 

Bad actors target entities worldwide via Cisco WebVPN

Hacking

 

Bad Santa! Microsoft Offers — 'Upgrade now' or 'Upgrade tonight' to Push Windows 10

Security

 

BadBarcode: Poisoned barcodes can be used to take over systems

 
 

Banking Malware Moving Over Facebook Hosted in Cloud

 
 

Bartalex Variants Spotted Dropping Pony, Dyre Malware

 
 

Be careful Facebook users, you are under attack!

Computer attack

 

Be careful, opening crashsafari.com your mobile will crash

Apple

 

Beaches, carnivals and cybercrime: a look inside the Brazilian underground

Crime

 

Behind the scenes at BruCON, a European hacker conference

 
 

Belkin's N150 router sports multiple flaws, including default access credentials for telnet server

 
 

Beware Coffee Lovers! StarBucks Exposed you to 3 Critical Vulnerabilities

Vulnerebility

 

Beware fake LinkedIn profiles, threat actors are using them to hack you

Social site

 

Beware of Apple-themed phishing emails threatening to limit your account

 
 

Beware of Backdoored Linux Mint ISOs

Hacking

 

Beware! Don't Fall for FireFox "HoeflerText Font Wasn't Found" Banking Malware Scam

 
 

Beware, connected ikettles can leak WiFi passwords

Security

 

Big Data investments on the rise

 
 

Bitcoin Core Developers Quit Bitcoin Project to Launch a New Digital Currency

Security

 

Bitcoin Creator 'Satoshi Nakamoto' Unmasked! An Australian Man 'Craig Wright' identified...

Technologies

 

Bitcoin Extortionist Copycats on the Rise, Experts Say 

 
 

Bitglass granted patent on searchable cloud encryption

 
 

BitKangoroo Ransomware Deletes User Files 

Ransomware

 

BitTorrent clients can be made to participate in high-volume DoS attacks

 
 

BitTorrent Fixes Reflective DDoS Attack Security Flaw

Computer attack

 

Black Friday and Cyber Monday, Keep Yourself Safe

Hacking

 

Black marketplace – 50c buys login for stolen media accounts

Hacking

 

BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents

Security

 

BlackEnergy infected also Ukrainian Mining and Railway Systems

Virus

 

BlackEnergy targets Ukrainian news media and electric industry

Virus

 

Blackhole Exploit Kit Resurfaces in the wild

Hacking

 

Blackmoon Banking Trojan Continues to Target South Korea 

 
 

BLEKey Device Breaks RFID Physical Access Controls

 
 

Blockchain transactions create risks for financial services

 
 

Bogus PayPal App used to spread a banking Trojan

Virus

 

Botnet of Thousands of Servers Mines for Crypto-Currency 

 
 

Brain's reaction to certain words could replace passwords

 
 

Breaches might be inevitable, but penalties are not harsh enough

 
 

Breaking — India Bans Facebook's Free Basics Service

Social site

 

British Gas customers’ data posted online, 2,200 records exposed

Hacking

 

British Intelligence Agency Can Hack Any Smartphone With Just a Text Message

Hacking

 

British Intelligence Open-Sources its Large-Scale Graph Database Software

NSA

 

British NCA revealed to have hacking abilities, aka equipment interference

Hacking

 

British-born ISIS Hacker Killed in US Drone Strike in Syria

ISIS

 

Brute-Force amplification attacks on WordPress rely on XML-RPC

Computer attack

 

Bug hunting without much tech knowledge or many tools

 
 

Bug in Android Gmail app allows effective email spoofing

 
 

Bug in Gmail app for Android Allows anyone to Send Spoofed Emails

Vulnerebility

 

Bug in OS X Yosemite allows attackers to gain root access

 
 

Bugs in Drupal's update process could lead to backdoored updates, site compromise

 
 

Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs

Vulnerebility

 

Business email compromise (BEC), the 5 billion dollar scam

 
 

Business email compromise scams still happening, still successful

 
 

Business leaders increasingly drive cloud migration

 
 

Businesses know about POS security risks, but are they investing wisely?

 
 

Businesses Using Millions of insecure SHA-1 Certificates

Security

 

Bye bye, Flash! Google to Ban Flash-based Advertising

Security

 

Bypass Developed for Microsoft Memory Protection, Control Flow Guard

 
 

Cadelle and Chafer, Iranian hackers are tracking dissidents and activists

Hacking

 

Can an inevitable evil be conquered?

Technologies

 

Can organizations hold back the tide of cloud adoption?

 
 

Can Scientists 'Upload Knowledge' Directly into your Brain to Teach New Skills?

Security

 

Canada – Military data found in hard drive at the recycling depot

Security

 

Canceled Talk Re-Ignites Controversy Over Legitimate Security Research 

 
 

Car Hacking Gets the Attention of Detroit and Washington

 
 

Car hacking via compromised car diagnostic tools

 
 

Carbanak gang is back and packing new guns

APT

 

Carbanak gang makes the headlines again, hackers refined intrusion tactics

 
 

Carbanak Hackers Refine Intrusion Tactics 

 
 

Carbanak Hackers Use Shims for Process Injection, Persistence 

 
 

Card Breach at Hilton Hotel Properties Under Investigation

Crime

 

Casino Sues Cyber Security Company Over Failure to Stop Hackers

Security

 

Caution! Hackers Can Easily Hijack Popular Baby Monitors to Watch Your Kids

Hacking

 

Caution, Hackers targeted the cPanel Database

Hacking

 

CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015

 
 

Census Bureau Says Breach Didn’t Compromise Sensitive Data

 
 

CenterPOS – The evolution of POS malware

Virus

 

Central Shop, the evolution of credit card black markets

Security

 

CERT Warns of Hard-Coded Credentials in DSL SOHO Routers

Hardware

 

CERT Warns of Slew of Bugs in Belkin N600 Routers

 
 

CFOs are not confident about their level of security

 
 

CIOs agree, IT is more complex than ever

 
 

CISA Passes Senate, criticism about privacy and security

Security

 

Cisco finds, removes more default SSH keys on its software

 
 

Cisco fixes a critical flaw in CISCO CVR100W Wireless-N VPN Small Business Routers

 
 

Cisco fixes Command Injection vulnerability in CISCO ACE 4710 products

Vulnerebility

 

Cisco Fixes DoS Vulnerability in ASR 1000 Routers

 
 

Cisco Industrial switches affected by an unpatched flaw

Vulnerebility

 

Cisco Jabber flaw allows MitM attackers to wiretap communications

 
 

Cisco patched CVE-2017-3881 IOS XE Vulnerability leaked in CIA Vault 7 Dump

 
 

Cisco Patches CIA Zero-Day Affecting Hundreds of Switches 

 
 

Cisco Patches Critical Flaw in Small Business Router 

 
 

Cisco Patches Denial-of-Service, Bypass Vulnerabilities in IOS

Vulnerebility

 

Cisco Patches File Overwrite Bug in IMC Supervisor and UCS Director

 
 

Cisco released a tool to scan for SYNful_Knock implants

Security

 

Cisco squashes DoS bug in its unified infrastructure software

 
 

Cisco Systems will be auditing their code for backdoors

 
 

Cisco Takes Down Ransomware Operation Generating $30 Million in Revenue For Hackers

Virus

 

Cisco Warns Customers About Attacks Installing Malicious IOS Bootstrap Images

Virus

 

Cisco wireless points include hardcoded passwords

Hardware

 

CISO at U.S. Bank offers tips for secure online purchasing

 
 

CISOs are looking for more integration and automation

 
 

Citovat Wassenaar, HP vytáhne z Mobile Pwn2Own

 
 

Civil nuclear facilities worldwide at risk of cyber attack

Cyber Attack

 

Clash of Greed

 
 

Class Action Suit Against Neiman Marcus Over Data Breach Revived

 
 

Clever Android ransomware infects tens of thousands of devices

Ransomware

 

Clickjacking Campaign exploits the European Cookie Law

Security

 

Click-Malware Podvod Šíøení pøes JavaScript Pøílohy

 
 

Cloud encryption and tokenization trends in financial services

 
 

Cloud-based solutions that protect against zero day attacks

 
 

Cloud-based vulnerability management: Top vendors in the field

 
 

Cloudflare Launches Service to Protect IoT Devices 

 
 

Cloud-Hosted Botnet Controllers on the Rise: Report 

 
 

Code Signing certificates becoming popular cybercrime commodity

Security

 

Coinvault, are we reaching the end of the nightmare?

Virus

 

Collision Attack: Widely Used SHA-1 Hash Algorithm Needs to Die Immediately

Computer attack

 

Comcast resets passwords for 200,000 users after login credentials go on sale

 
 

Commercial code is more compliant to security standards than open source code

 
 

Comodo Internet Security opened your PC to attackers

Security

 

Comodo Issues Eight Forbidden Certificates

 
 

Comodo's so-called 'Secure Internet Browser' Comes with Disabled Security Features

Vulnerebility

 

Companies investing in cloud, security and Big Data are growing faster

 
 

Companies leave vulnerabilities unpatched for up to 120 days

 
 

Companies still lack security controls for accessing enterprise applications

 
 

Complex security solutions are exposing companies to risk

 
 

Compliance vs. cybersecurity: Insurers face competing priorities

 
 

Compromising Macs with simple Gatekeeper bypass

 
 

Conexant audio driver works as Built-in Keylogger feature in dozens HP devices

 
 

Confidence in antivirus falls to all-time low

 
 

Confusion about IT security leaves devices at risk

 
 

Confusion regarding strategic defenses for network security

 
 

Consent Control and eDiscovery: Devils in GDPR Detail 

 
 

Consumers expect businesses to be more transparent on how their data is used

 
 

Consumers increasingly adopting personal security measures

 
 

Container security concerns escalate

 
 

Cops are turning to privately held DNA databases for info to help with investigations

 
 

Core Infrastructure Initiative Launches Open Source Security Badge Program

Open source

15.9.2015

CoreBot Adds New Capabilities, Transitions to Banking Trojan 

Virus

 

CoreBot Malware Steals Credentials-For Now

 
 

Corporate networks can be compromised via Windows Updates

 
 

Cost of Breaking SHA-1 decreases due to a new Collision Attack

Computer attack

 

Cox Communications to pay $595,000 for data breach

 
 

Cracka hackers doxed more than 2,000 Government employees

Hacking

 

Cracka hackers who doxed CIA Chief, not hit the FBI Deputy Director

Hacking

 

Cracking WiFi Passwords By Hacking into Smart Kettles

Hacking

 

Cracks in the mobile ecosystem, Internet-connected devices

 
 

Creator of MegalodonHTTP DDoS Botnet Arrested

Security

 

Credential manager system used by Cisco, IBM, F5 has been breached

 
 

Criminals behind CryptoWall 3.0 Made $325 Million

Virus

 

Criminals hacked chip-and-PIN system by perfecting researchers' PoC attack

 
 

Criminals, Linguistics, Literacy and Attribution

Crime

 

Critical Bugzilla flaw allows access to unpatched vulnerability information

 
 

Critical Flaw Patched in Jenkins Automation Server 

 
 

Critical Flaws Found in NETGEAR Network Management System

Vulnerebility

 

Critical Flaws Found in Network Management Systems

 
 

Critical Flaws in Magento leave Millions of E-Commerce Sites at Risk

Vulnerebility

 

Critical glibc Flaw Puts Linux Machines and Apps at Risk (Patch Immediately)

Vulnerebility

 

Critical Java Bug Extends to Oracle, IBM Middleware

 
 

Critical Joomla RCE bug actively exploited, patch immediately!

 
 

Critical Netgear Router Exploit allows anyone to Hack You Remotely

Vulnerebility

 

Critical OpenSSH Flaw Leaks Private Crypto Keys to Hackers

Vulnerebility

 

Critical OpenSSL Flaw Allows Hackers to Decrypt HTTPS Traffic

Vulnerebility

 

Critical 'Port Fail' Vulnerability Reveals Real IP Addresses of VPN Users

Vulnerebility

 

Critical RCE bug in FireEye's security appliances exploitable via email

 
 

Critical RubyGems vulns can lead to installation of malicious apps

 
 

Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking

 
 

Critical vulnerabilities found in Honeywell Midas Gas Detectors

Vulnerebility

 

Critical Vulnerabilities in 3G/4G Modems or how to build Big Brother

Vulnerebility

 

Crooks are abusing Google Search Console to remain under the radar

Technologies

 

Crooks are offering Apple employees up to $23,000 for their login credentials

Apple

 

Crooks steal over $50 million from aircraft systems manufacturer FACC

Crime

 

Crooks stole €600,000 in MitM attacks on EMV Cards

Hacking

 

Crooks use the Nuclear Exploit Kit to serve CryptoWall 4.0

Virus

 

Cross-device tracking via imperceptible audio beacons threatens user privacy

 
 

Crypto e-mail provider ProtonMail pays ransom to stop DDoS attack, attack continues

 
 

Crypto-ransomware encrypts files "offline"

 
 

Cryptowall 4.0 comes from Russia, Bitdefender released a vaccine

Virus

 

CryptoWall 4.0 Released with a New Look and Several New Features

Virus

 

CryptoWall Ransomware raised $325 Million in Revenue for Its Developer

Virus

 

CSA releases tool for personal data legal protection

 
 

CSRF Flaw Patched in Popular Spring Social Core Library

 
 

CTB-Locker is back: the web server edition

Virus

 

CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers

Virus

 

CUJO: Plug-n-play protection for all devices

 
 

Curbing the For-Profit Cybercrime Food Chain

 
 

Custom Google App Engine Tweak Still Leads to Java Sandbox Escapes 

 
 

Custom secure apps are gaining popularity in the enterprise

 
 

Customers of Japanese banks targeted by the Brolux Trojan

Virus

 

CVE-2015-8562 – 16,000 Daily Attacks on vulnerable Joomla servers

Vulnerebility

 

CVE-2016-0603 – Oracle Issues out-of-box Java emergency patch for Windows

Vulnerebility

 

Cyber attack grounds Polish LOT aeroplanes

 
 

Cyber attack on US power grid could result in losses up to $1 trillion

 
 

Cyber attack overall cost suffered last year by businesses is $315b

Security

 

Cyber Caliphate Hacks 54k Twitter accounts, including ones of CIA and FBI officials

Hacking

 

Cyber crooks abuse legitimate EU Cookie Law notices in clever clickjacking campaign

 
 

Cyber crooks actively hijacking servers with unpatched vBulletin installations

 
 

Cyber crooks opt for APT method for delivering malware

 
 

Cyber defence is a profitable “Hamster Wheel”

Cyber Attack

 

Cyber insurance market to hit US$10 billion by 2020

 
 

Cyber liability insurance is becoming an increasing necessity

 
 

Cyber risk still poorly communicated to C-suite executives

 
 

Cyber security guidelines for the shipping industry

 
 

Cyber spies of the Sofacy APT increased its operations tenfold

Hacking

 

Cyber Terrorists Can Get Their Hands on UK Infrastructure, Like the Net or Electricity

Security

 

Cyber warfare fears spur US Navy to teach celestial navigation again

 
 

Cyberattacks will cost U.S. health systems $305 billion

 
 

Cybercriminals are becoming more creative

 
 

Cybercriminals are preying on existing vulnerabilities to plan future attacks

 
 

Cybercriminals increasingly hunting down the money

 
 

Cybercriminals to target new payment technologies

 
 

Cyberespionage group exploits satellites for ultimate anonymity

 
 

Cybersecurity expectations: Myth and reality

 
 

Cybersecurity is being taken seriously around the globe

 
 

Cybersecurity Operational Tests And Assessments – US Defence can’t check F-35 data due to insecure systems

Security

 

Cybersecurity strategies and the boardroom

 
 

CyberSpace — China arrested Hackers at U.S. Government Request

Cyber Attack

 

Cyberspace Global Warming as a duality of Trajectories on cyberpolitics

Cyber Attack

 

Cyberspies Use KONNI Malware to Target North Korea 

 
 

Czech Court to Rule This Month on Extradition of Russian Hacker 

 
 

Damballa revealed the secrets behind the Destover malware that infected the Sony Pictures

Virus

 

Darkhotel APT Latest to Use Hacking Team Zero Day

 
 

DarkHotel hackers are back targeting Chinese Telecom

Hacking

 

Darkhotel spying crew boosts attacks with Hacking Team exploit

 
 

Darkode forum returns with lousy security that keeps serious users away

 
 

Darkode forum was supposed to be resuscitated, but …

Security

 

Darkweb, a look back at 2015 events and 2016 predictions

Security

 

DARPA is working on ICARUS, the disappearing delivery drone

Technologies

 

DARPA Protecting Software From Reverse Engineering Through Obfuscation 

 
 

Data Breach Day — Patreon (2.3M), T-Mobile (15M) and Scottrade (4.6M) — HACKED!

Crime

 

Data breaches and bots are driving cybercrime surge

 
 

Data breaches, stolen data and their sale in the Dark Web

Crime

 

Data dump points to a breach at Electronic Arts

 
 

Data of 34,000 Steam users exposed due to buggy caching configuration

Security

 

Database of 70 million prisoner phone calls breached, leaked

 
 

Database with 191 Million US voters’ personal data exposed online

Hacking

 

Dating scam package offered in the underground

Security

 

DDoS attack on BBC may have reached 602Gbps, never so powerful

Computer attack

 

DDoS attacks increase 180% compared to a year ago

 
 

Deadly Simple Exploit Bypasses Apple Gatekeeper Security to Install Malicious Apps

Virus

 

Deadly Windows, Reader font bugs can lead to full system compromise

 
 

De-anonymizing code authors by analyzing executable binaries

 
 

Deep Web Search Engines to Explore the Hidden Internet

Security

 

Default Apache Configuration Can Unmask Tor Hidden Services

Security

 

Default conf on Apache Web servers can de-anonymize your hidden service

Security

 

Deleting WhatsApp Messages Before 90 Days Could Land you in Jail

Security

 

Dell puts users at risk with dangerous eDellRoot root certificate

Hacking

 

Dell shipped computers with root CA cert, private crypto key included

 
 

Dell's Laptops are Infected with 'Superfish-Like' pre-installed Malware

Virus

 

Demand for new malicious programs reaches saturation point

 
 

Dennis Fisher On Security, Journalism, and the Origins of Threatpost 

 
 

Deplorable Steam security flaw exploited to hijack prominent accounts

 
 

Design Flaws Make Drones Vulnerable to Cyber-Attacks

Computer attack

 

Details Surface on Patched Bugzilla Privilege Escalation Flaw 

 
 

Details Surface on Patched Sandbox Violation Vulnerability in iOS

Vulnerebility

 

DHS Funds Smartphone Authentication Projects 

 
 

DHS Information Security Program, Dozens secret databases vulnerable to hack

Security

 

DHS Raises Privacy Concerns With Senate Cyber Threat Sharing Bill

 
 

DHS working on ‘self-destructing’ security chip for smartphones

Hardware

 

DHS: Drug Traffickers are hacking surveillance drones on the border

Security

 

Did FBI pay the Carnegie Mellon to hack Tor?

Hacking

 

Did terrorists use PlayStation 4 for communications in Paris attacks?

ISIS

 

Digitally signed spam campaign spotted delivering malware

 
 

Disbanding the ‘Zoo’

Security

 

Disclosed Netgear Router Vulnerability Under Attack

Vulnerebility

 

Discover how many ways there were to hack your Apple TV

Hacking

 

Discovered a new DB containing more than 56 million records of US Voters

Hacking

 

Discovered an ISIL Bitcoin Address containing 3 Million dollars

ISIS

 

Disgusting! Ashley Madison was Building an App – 'What's your Wife Worth?'

Hacking

 

Distrust in use of personal data could hinder business growth

 
 

D-Link accidentally leaks code-signing certs in its firmware

 
 

D-Link Accidentally Leaks Private Code-Signing Keys 

 
 

D-Link Accidentally Publishes Its Private Code-Signing Keys on the Internet

Security

 

Dmail: A Chrome extension for sending self-destructing emails

 
 

Do CEOs know enough about cyber security?

 
 

Do CISOs deserve a seat at the leadership table?

 
 

Do conventional security measures negatively impact productivity?

 
 

Do security flaws with life-threatening implications need alternative disclosure?

 
 

Do we need harsher penalties and enforced data breach detection measures?

 
 

Do you have a Netgear ProSAFE NMS300? Here you are the exploit to hack it

Vulnerebility

 

Documents demonstrate NSA continued mass surveillance

NSA

 

Does Mr. Robot’s use real Hacking Tools? Which are?

News

 

Don’t set your iPhone’s Date to January 1, 1970 or your will brick it

Apple

 

Don’t throw away your old Boarding Pass, it may contain personal information

Security

 

Donald Trump — Boycott Apple! But Still Tweeting from an iPhone

Apple

 

Dow Jones & Company Latest Financial Firm Hit With Data Breach 

 
 

Dozens of games infected with Xiny available on the Google Play

Android

 

Dridex Banking Malware Back in Circulation

 
 

Dridex Botnets are still active and effective

Virus

 

DropboxCache Backdoor, a new Cross-Platform threat

Virus

 

DROWN Attack — More than 11 Million OpenSSL HTTPS Websites at Risk

Computer attack

 

Drupal moves to fix flaws in update process

 
 

Dutch Police Arrest Alleged CoinVault Ransomware Authors

 
 

Dutch Police Training Eagles to Take Down Rogue Drones

Security

 

Duuzer Trojan: A New Backdoor Targeting South Korean Organizations

Virus

 

Duuzer, a data stealer Trojan targets South Korean organizations

Virus

 

Dyre crackdown, the biggest effort to date by Russian authorities against cybercrime

Virus

 

Dyreza Trojan Targeting IT Supply Chain Credentials 

 
 

Easily exploitable Certifi-gate bug opens Android devices to hijacking

 
 

eBay Fixes XSS Flaw in Subdomain

 
 

eBook: 5 Essential Steps to PCI DSS Compliance

 
 

eBook: Cybersecurity for Dummies

 
 

eBook: Fighting Known, Unknown, and Advanced Threats

 
 

eBook: Website Security for Dummies

 
 

eDiscovery - An Enterprise Issue That Can't be Ignored 

 
 

Edward Snowden to discuss privacy at IP EXPO Europe 2015

 
 

eFast browser deletes and replaces your Chrome Browser

Security

 

EFF delves into privacy practices of Apple, Google, Twitter, and others

 
 

EFF Scoreboard – Secure Messaging, stay safe online

Security

 

EFF, AdBlock and Others Launch New Do Not Track Standard

 
 

EFF: T-Mobile breaks neutrality rules with Binge On service

 
 

EFF's Privacy Badger prevents users being tracked online

 
 

Elasticsearch servers actively targeted by botmasters

 
 

Email accounts belonging to 130 Celebrities have been Hacked

Hacking

 

Email is more secure today than it was two years ago

 
 

Email Security Device "nomx" Has Serious Flaws: Researchers 

 
 

Embedded Devices Share, Reuse Private SSH Keys, HTTPs Certificates 

 
 

EMEA organizations are being pre-emptive about security

 
 

Emergency Flash update plugs zero-day exploited in the wild

 
 

Emergency IE Patch Fixes Vulnerability Under Attack

 
 

Emergency Patch released for Latest Flash Zero-Day Vulnerability

Vulnerebility

 

Emergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomware

Virus

 

Employee credentials of half of European top 500 firms exposed online

 
 

Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K

Security

 

Employee use of cloud services puts business data at risk

 
 

ENCRYPT Act of 2016 — Proposed Bill Restricts States to Ban Encryption

Security

 

Encrypted Email Servers Seized by German Authorities After School Bomb Threats

Security

 

Encryption, Lock Mechanism Vulnerabilities Plague AppLock

 
 

Endpoint security lags in spite of vulnerabilities

 
 

Endress+Hauser Patches Buffer Overflow In Dozens of ICS Products

 
 

End-to-end encrypted database ZeroDB is now open source

 
 

Energy industry under unceasing attack in 2015

Computer attack

 

Energy security pros: More competent, or just naive?

 
 

Enhanced security for corporate information on mobile devices 

 
 

Enhanced security for corporate information on mobile devices 

 
 

ENISA Threat Landscape 2015, a must reading

Security

 

Entrust Datacard integrates with Citrix to enable secure anytime-anywhere productivity

 
 

EPIC Fail — For the Third Time, Linux Ransomware CRACKED!

Virus

 

Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector

Virus

 

EU plans to ban Bitcoin to curb terrorism funding

Security

 

EU regulation to Impose rules on firms to improve cybersecurity

Cyber Attack

 

Europe Emerges as Major Source of Cyber Attacks: Reports 

 
 

European Aviation Agency Warns of Aircraft Hacking

Hacking

 

European Aviation Safety Agency – Airplane hacking is reality

Hacking

 

European credit card payment terminals are plagued with serious flaws

Vulnerebility

 

European data centre services provider Interxion suffers breach

 
 

European law enforcement takes down Darknet marketplace

 
 

European Parliament members want member states to protect Edward Snowden

 
 

European Police Agencies declare war on DroidJack RAT

Virus

 

European police corps arrested operators behind darknets offering illegal products and services

Security

 

European Space Agency domains hacked by Anonymous

Hacking

 

Europe's new "net neutrality" regulation is full of loopholes

 
 

Europol Probing IS Setting Up of Social Network 

 
 

Europol, a new EU counter terrorism centre opening this month

Security

 

Europol, a new move against terrorism and money laundering

Security

 

Evaluating the security of open source software

 
 

Every Call You Make or Text You Send, They'll Be Tracking From Today

Security

 

Evolution and Escalation: Two Key Cyber Threat Trends 

 
 

Exabeam secures $25 million in Series B funding

 
 

Existing security standards do not sufficiently address IoT

 
 

Expedia users targeted by phisher who gained access to their info

 
 

Experian Breach Spills Data on 15 Million T-Mobile Customers 

 
 

Experian Breach: 15 Million T-Mobile Customers' Data Hacked

Crime

 

Experian’s data breach puts 15 million T-Mobile users at risk

Crime

 

Expert discovered how to hack any Facebook account

Social site

 

Expert discovered online data belonging to the trading firm AMP

 
 

Experts discovered the attack platform used by the Winnti Group

Virus

 

Experts warn Neutrino and RIG exploit kit activity spike

Virus

 

Exploit broker offers $1 million for reliable iOS 9 exploit

 
 

Exploit kit activity up 75 percent

 
 

Exploit Writing and Mitigation Going Hand in Hand

 
 

Exploitable Details of Intel's 'Apocalyptic' AMT Firmware Vulnerability Disclosed 

 
 

Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information

Computer attack

 

Exploring the North American cybercriminal underground

 
 

Exposing cyberattacks targeting government networks in Southeast Asia

 
 

Exposing fraud behavior patterns associated with compromised identities

 
 

EZCast TV streaming stick leaves home networks vulnerable to attack

 
 

Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool

Social site

 

Facebook first discovered spear phishing attacks of Iranian hackers on State Department employees

Hacking

 

Facebook introduces end-to-end encryption for notifications

 
 

Facebook is testing Self-Destructing Messages for Messenger App

Social site

 

Facebook M: Facebook's Answer to Siri, Cortana and Google Now

Technologies

 

Facebook Offering You $1000 to Run Advertisement Against Terrorism

Social site

 

Facebook slowly fine-tuning its popular ThreatExchange

 
 

Facebook starts warning users of state-sponsored attacks against their accounts

 
 

Facebook to Launch Its Own Satellite to Beam Free Internet

Technologies

 

Facebook tries to help advertisers and users with new ad control options

 
 

Facebook Updates Information-Sharing Platform

 
 

Facebook Will Now Notify You If NSA is Spying on You

Social site

 

Facebook wins Flash by knock out by switching to HTML5!

Social site

 

Facebook XSS could have allowed attackers to take over users’ accounts

Security

 

Facebook. Beware state-sponsored hackers are trying to hack you!

Social site

 

Facebook's Vice President Arrested in Brazil for Refusing to Share WhatsApp Data

Social site

 

Factors that influence breach costs

 
 

FAKBEN Ransomware-as-a-service emerges from the underground

Virus

 

Fake "account verification" email targeting Alibaba.com users

 
 

Fake recruiters on LinkedIn are targeting infosec pros

 
 

Fake Twitter verification profiles trick victims into sharing personal, payment card info

 
 

Fareit malware avoids detection using a different file hash for each attack

Virus

 

Fatboy Ransomware as a Service sets the ransom based on the victims’ location

 
 

FBI Admits — It was a 'Mistake' to Reset Terrorist's iCloud Password

Apple

 

FBI denies paying $1 MILLION to Unmask Tor Users

Security

 

FBI Deputy Director's Email Hacked by Teenager Who Hacked CIA Chief

Hacking

 

FBI Director — "What If Apple Engineers are Kidnapped and Forced to Write (Exploit) Code?"

Apple

 

FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption

Security

 

FBI director insists Silicon Valley can solve the encryption dilemma - if they try hard enough

 
 

FBI is hunting MrGrey who has stolen 1.2 BILLION login credentials

Hacking

 

FBI must reveal the network investigative technique used to hack more than 1000 computers

Hacking

 

FBI reportedly Paid $1 Million to University Researchers for UnMasking Tor Users

Security

 

FBI Screwed Up — Police Reset Shooter's Apple ID Passcode that leaves iPhone Data Unrecoverable

Apple

 

FBI Suggests Ransomware Victims — 'Just Pay the Ransom Money'

Virus

 

FBI Warns of Increase in DDoS Extortion Scams

 
 

FBI Warns Public Officials of Doxing Threat

 
 

FBI warns Time Warner Cable of potential data breach

 
 

FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud

 
 

FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack

Cyber Attack

 

FCC Says Website Downtime Caused by DDoS Attacks 

 
 

Feasible ‘Going Dark’ Crypto Solution Nowhere to be Found

 
 

February 2016 Patch Tuesday – All Windows are affected by a critical flaw

Vulnerebility

 

Federal CISOs Propose New Efforts to Shore Up Cybersecurity

 
 

Federálové Change Policy vyžadovat rozkaz k použití Stingrays

 
 

Fewer IPsec VPN Connections at Risk from Weak Diffie-Hellman

 
 

File insecurity: the final data leakage frontier

 
 

File-stealing Firefox bug exploited in the wild, patch immediately!

 
 

FIN5 hacking crew steals 150,000 credit cards from casino

Hacking

 

FIN7 group has enhanced its phishing techniques

 
 

Final rule implements the Executive Order 13694. US can apply economic sanctions in response to cyber attacks

Security

 

Final TalkTalk breach tally: 4% of customers affected

 
 

Finally! A free, open source, on-premise virus scanner framework

 
 

Finance organizations risk data by failing to secure unique employee logins

 
 

Finance teams becoming involved in cyber risk mitigation oversight

 
 

Financial impact of SaaS storage breaches now $13.85 million

 
 

Financial Reporting Council of Nigeria site used for phishing scam

Security

 

FireEye Appliances affected by a critical flaw simply exploitable

Hardware

 

FireEye legally censors crucial parts of a researcher's talk at 44CON

 
 

Firefox 40: New features and critical security updates

 
 

Firefox 41 integrates Free Built-in Instant Messaging and Video Chat to Your Browser

Technologies

 

Firefox 42 is out, with many privacy and security improvements

 
 

Firefox blocks Flash plugin by default until zero-days are fixed 

 
 

Firefox blocks Flash plugin by default until zero-days are fixed 

 
 

Firewalls for SMBs that chew through encrypted streams

 
 

FIRST announces CVSS version 3

 
 

First Ever Anti-Drone Weapon that Shoots Down UAVs with Radio Waves

Technologies

 

First ever EU rules on cybersecurity

 
 

First Let’s Encrypt Free Certificate Goes Live

 
 

First Mac OS X Ransomware Targets Apple Users

Apple

 

First step in cross-platform Trojan bankers from Brazil done

Virus

 

Fitbit trackers can be infected with a malware in just 10 seconds

Virus

 

Fitbit, warranty fraud, and hijacked accounts

 
 

Five key cybersecurity trends for 2016

 
 

Five major Big Data predictions for 2016

 
 

Five points of failure in recovering from an attack

 
 

Five principal cloud security challenges

 
 

Five years of hardware and software threat evolution

 
 

Flash 0-day exploit found in Hacking Team's leaked data exploited by criminals

 
 

Flash Player 0-day exploited in the wild, patch immediately!

 
 

Flaw allows hijacking of professional surveillance AirLive cameras

 
 

Flaw in Comcast's home security system lets burglars in without triggering alarm

 
 

Flaw in Linux.Encoder1 ransomware reveals the decryption key

Virus

 

Flaw in Magento exposes millions of websites at risk of takeover

Vulnerebility

 

Flaw in the Android Gmail app opens to email spoofing attacks

Android

 

Flawed RANSOM_CRYPTEAR ransomware makes impossible the file recovery

Virus

 

Flaws Found in Evoko Meeting Room Management Devices 

 
 

Flaws in ATMs of a German Bank open the doors to cyber attacks

Computer attack

 

Flaws in industrial gas detectors exploitable by low-skilled attackers

 
 

Flaws in medical data management system can be exploited to modify patient information

 
 

For Better Privacy & Security, Change these iOS 9 Settings Immediately

Apple

 

Forensics Tool Flaw Allows Hackers to Manipulate Evidence 

 
 

Former DoE worker was hacking to steal nuclear secrets and resell them

Hacking

 

Former Employee tried to sell Yandex Source Code for Just $29K

Security

 

Former journalist faces 25 years in prison for article defacement

 
 

Four critical Android bugs patched, one could lead to permanent device compromise

 
 

Four essential tips that you can use to stay safe when you travel

 
 

Four Zero Days Disclosed in Internet Explorer Mobile

 
 

Fourth, a 16-year-old Hacker, Arrested over TalkTalk Hack

Hacking

 

Fragmented approaches to PKI don't always follow best practices

 
 

France could Fine Apple $1 Million for each iPhone it Refuses to Unlock

Apple

 

France wants to BAN Tor and Free Wi-Fi Services after Paris Terror Attacks

Security

 

France will not Ban Public Wi-Fi Or Tor Network, Prime Minister Valls Confirms

Security

 

Fraudsters steal nearly $47 million from Ubiquiti Networks

 
 

Free PCI and NIST compliant SSL test

 
 

Free Ransomware Decryption Tool — CoinVault and Bitcryptor

Virus

 

Free tool helps organizations respond to vulnerability reports

 
 

Free Web Hosting 000Webhost hacked, 13 Million users impacted

Hacking

 

Free WordPress plugin for a password-free login

 
 

French activist accuses Anonymous #OpParis of hindering Law Enforcement

ISIS

 

French Authorities Warn Against Spreading Leaked Macron Data 

 
 

French Gov could fine Apple and Google €1m unless they hack mobile devices

Apple

 

From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered

Vulnerebility

 

From Today Onwards, Don't You Even Dare to Use Microsoft Internet Explorer

Security

 

FTC amends telemarketing rule to ban payment methods used by scammers

 
 

FTC, Experts Push Startups to Think About Security From the Beginning 

 
 

Future attacks: Hiding exploit code in images

 
 

Fuze Collaboration Platform Allowed Anyone to Download Recorded Meetings 

 
 

GameOver Zeus gang boss also engaged in cyber espionage

 
 

Gary McGraw on Scalable Software Security and Medical Device Securityf

 
 

Gaza cybergang, where’s your IR team?

Security

 

Gemalto Breach Level Index report 2015, what are hackers looking for?

Hacking

 

General Motors invites hackers to report security flaws in their cars

 
 

German authorities approve the use of home-made Federal Trojan

Virus

 

German Government Audits TrueCrypt

 
 

German Spy-Agency Trades Citizens' Metadata in Exchange for NSA's Xkeyscore

NSA

 

Germany probes alleged new case of US espionage: Regin malware infected Gov laptop

Virus

 

Germany's new cyber-security law aimed at securing critical infrastructure

 
 

Getting BYOD right

 
 

GCHQ accused of illegal Computer Network Exploitation activities

Security

 

GCHQ and NCA hunting criminals in the dark web

Security

 

GCHQ Gaffer database goes open source

NSA

 

GCHQ helped US in developing Stuxnet, claims a documentary

NSA

 

GCHQ open sources Gaffer, a data collection and mining framework

 
 

Gift cards and return merchandise fraud scheme

Hacking

 

Github Mitigates DDoS Attack

 
 

GlassRAT, the threat that remained stealth for years

Virus

 

Global action takes down Darkode cybercriminal forum

 
 

Global and Modern Terrorism/Cyber Terrorism

Cyber Attack

 

Global cyber insurance market to grow to over $20 billion by 2025

 
 

Global cyberconflicts, hacktivism and disruptions are on the horizon

 
 

Global hacker competition challenges penetration testers

 
 

Global information security spend grows by 5% in 2015

Security

 

Global Internet experts reveal plan for more secure, reliable Wi-Fi routers

 
 

Global managed security services market to reach $29.9 billion by 2020

 
 

GM Bot (Android Malware) Source Code Leaked Online

Android

 

GnuPG 2.1.9 released

 
 

Gone in Less Than a Second

 
 

Google 0-Day Hunters Find 'Crazy Bad' Windows RCE Flaw

 
 

Google adds another obstacle for developers of deceptive Chrome extensions

 
 

Google 'Android N' Will Not Use Oracle's Java APIs

Security

 

Google announces reward program for Android bugs

 
 

Google debuts customized warning for social engineering sites

 
 

Google Details Plans to Disable SSLv3 and RC4

Security

 

Google Docs Phishing Scam Doused After Catching Fire 

 
 

Google Drive security boost for paying customers

Security

 

Google hacker criticized TrendMicro for critical flaws

Hacking

 

Google hacker Forshaw’ verdict about Windows 10

Windows

 

Google helps Adobe improve Flash security

 
 

Google Helps Lead Effort Against Automated Traffic From Data Centers

 
 

Google Chrome update includes 43 security fixes

 
 

Google is Merging its Chrome OS with Android

Android

 

Google is testing password-free logins

 
 

Google Makes Full-Disk Encryption Mandatory for New Android 6.0 Devices

Android

 

Google Moving Gmail to Strict DMARC Implementation

 
 

Google Offers $20,000 to Join OSS-Fuzz Program 

 
 

Google Patches 6 Critical Android Mediaserver Bugs in May Security Update

 
 

Google Patches Critical Remotely-exploitable Flaws in Latest Android Update

Android

 

Google Patches Critical Vulnerabilities in Chrome 45

 
 

Google Patches Latest Android Lockscreen Bypass

 
 

Google Patches More Critical Flaws in Android Mediaserver 

 
 

Google patches Stagefright 2.0 on Nexus devices

 
 

Google Plans Monthly Security Updates for Nexus Phones

 
 

Google Play Apps Expose Tens of Millions to Adware: Sophos 

 
 

Google Play Store increases Android APK Size Limit from 50MB to 100MB

Android

 

Google plugs Google Admin app sandbox bypass 0-day

 
 

Google Project Zero Turns Over 11 Bugs in Galaxy S6 Edge

 
 

Google Pushes Stagefright 2.0 Patches to Nexus Devices 

 
 

Google records and maintains all our voice searches

Security

 

Google releases new hub for managing security and privacy settings

 
 

Google releases Security Patch for Android Stagefright 2.0 Vulnerability

Vulnerebility

 

Google Researcher Details Linux Kernel Exploit 

 
 

Google researcher finds critical flaws in Trend Micro AV solution

 
 

Google Researchers Find "Worst" Windows RCE Flaw 

 
 

Google Safe Browsing to start blocking sites with ads leading to unwanted software

 
 

Google Secretly Records Your Voice — Here's How to Listen and Delete It

Security

 

Google Tightens OAuth Rules to Combat Phishing 

 
 

Google to Disable Weak SSLv3 and RC4 Protocols to Boost Internet Security

Security

 

Google to Pause Flash Ads in Chrome Starting Next Week

 
 

Google to Speed Up Chrome for Fast Internet Browsing

Software

 

Google to Warn Recipients of Unencrypted Gmail Messages 

 
 

Google Wants to Fly Drones Over Your Head to Deliver High Speed 5G Internet

Technologies

 

Google will switch from Java APIs to OpenJDK

Security

 

Google, Mozilla, Microsoft to Sever RC4 Support in Early 2016

Security

 

Google’s $85 Chromebit Lets You Turn Any Monitor or TV into a Computer

Technologies

 

Google's Android Stagefright patch is flawed

 
 

Government Agencies probed over use of backdoored Juniper equipment

Vulnerebility

 

Government Asks for Security Community’s Help on Technical Issues

 
 

Government Could Hack Children's Toys to Spy on You

Hacking

 

Government Organizations Targeted in "Netrepser" Attacks 

 
 

Government Releases Policy on Vulnerability Discovery and Disclosure

 
 

GovRAT, the malware-signing-as-a-service platform in the underground

Virus

 

GPS faker software broadcasts spam across thousands of fake profiles

 
 

Granick: Dream of Internet Freedom ‘Dying’

 
 

Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

 
 

GreenDispenser, is the last ATM Malware in the wild

Virus

 

Group using DDoS attacks to extort business gets hit by European law enforcement

 
 

Growth in Cyber Fraud Attacks Outpacing Growth of Transactions: Report 

 
 

Guide to application whitelisting

 
 

Guidelines for smart city technology adoption

 
 

Hack the Pentagon — US Government Challenges Hackers to Break its Security

Hacking

 

Hacker Buba is asking UAE bank for $3 million ransom

Virus

 

Hacker Claims He helped FBI Track Down ISIS Hacker (Who was killed in Drone-Strike)

ISIS

 

Hacker claims Sony PlayStation 4 Jailbreak

Hacking

 

Hacker Confirms PlayStation 4 Jailbreak! Exploit Could Open Doors for Pirated Games

Hacking

 

Hacker Demonstrated Untethered iOS 9 Jailbreak On Video 

Apple

11.9.2015

Hacker Demonstrated Untethered iOS 9 Jailbreak On Video 

Apple

 

Hacker Finds a Simple Way to Bypass Android 5.x Lock Screen [Steps & Video]

Android

 

Hacker had access to sensitive info about Firefox bugs for over a year

 
 

Hacker holds Netflix to ransom over new episodes of Orange Is The New Black

 
 

Hacker Leaks Info of 30,000 FBI and DHS Employees

Hacking

 

Hacker leaks sensitive info of millions of Adult FriendFinder users

 
 

Hacker steals Bitdefender customer info, blackmails company

 
 

Hacker-Friendly Search Engine that Lists Every Internet-Connected Device

Hacking

 

Hackers are blackmailing the creator of Open-Source Ransomware

Virus

 

Hackers are exploiting Magento flaw to steal payment card info

 
 

Hackers are exploiting zero-day flaw in fully patched Adobe Flash

 
 

Hackers Are Offering Apple Employees $23,000 for Corporate Login Details

Hacking

 

Hackers are selling fake diplomas and certifications in the dark web

 
 

Hackers are spending a huge amount of resources targeting financial services

 
 

Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocol

 
 

Hackers are using Nuclear Exploit Kit to Spread Cryptowall 4.0 Ransomware

Virus

 

Hackers Backdooring Cisco WebVPN To Steal Customers’ Passwords

Hacking

 

Hackers behind Dark Seoul are back

Hacking

 

Hackers behind Dyre Malware Busted in Police Raid

Virus

 

Hackers breach firm whose tech is used in Samsung Pay

 
 

Hackers Can Remotely Record and Listen Calls from Your Samsung Galaxy Phones

Hacking

 

Hackers can tamper with medical drug pumps, leading to fatal outcomes

 
 

Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?

Virus

 

Hackers Cause World's First Power Outage with Malware

Virus

 

Hackers claim ISIS Militants linked to Paris Attacks had a Bitcoin Wallet worth $3 Million

ISIS

 

Hackers Exploit Free SSL Certs from Let's Encrypt to Spread Malware

Virus

 

Hackers Exploit SS7 Flaws to Loot Bank Accounts 

 
 

Hackers Find A Way To Disable Car Airbags System

Hacking

 

Hackers have accessed details of 1,827 Vodafone customers

Hacking

 

Hackers have Hacked into US Arrest Records Database

Hacking

 

Hackers hit UCLA Health, access medical files of 4.5 million patients

 
 

Hackers in the wild attempt to exploit the Juniper Backdoor

Hacking

 

Hackers leaked DHS staff records, 200GB of files are in their hands

Hacking

 

Hackers Plan to Ruin Christmas Eve for Millions of PlayStation and Xbox Live Gamers

Hacking

 

Hackers put up for sale 13 million plaintext passwords stolen from 000webhost

 
 

Hackers show how reuse barcodes to be able to get fuel discounts

Hacking

 

Hackers stole personal info of over a million of Japanese pensioners

 
 

Hackers Threaten Media Firms After Stealing Unreleased TV Shows 

 
 

Hackers trace ISIS Twitter accounts back to the UK govt

ISIS

 

Hackers WIN $1 Million Bounty for Remotely Hacking latest iOS 9 iPhone

Hacking

 

Hack-Fueled ‘Unprecedented’ Insider Trading Ring Nets $100M

Hacking

 

Hacking CCTV Cameras to Launch DDoS Attacks

Computer attack

 

Hacking discipline, EOL of computer science in the cyber domain

Hacking

 

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

Hacking

 

Hacking Smartphones Running on MediaTek Processors

Mobil

 

Hacking Team hacked, 400GB+ of company documents and emails leaked

 
 

Hacking Team Offering Encryption Cracking Tools to Law Enforcement Agencies

Hacking

 

Hacking Team pitches encryption-cracking tools to US law enforcement

 
 

Hacking Team scrambling to limit damage brought on by explosive data leak

 
 

Hacking Team's Flash 0-day exploit used against Korean targets before it was leaked

 
 

Hacktivists and cyber extortionists hit Greek, Russian, UAE banks

 
 

Half of iPhones on corporate networks run outdated iOS versions

 
 

Hard-hitting insights into global attacks targeting organizations

 
 

Hardware encryption market revenue to reach $36.4 billion by end of 2015

 
 

Hashcat, the fastest Password Cracking utility is now Open Source

Security

 

Health Insurer Excellus Hacked; 10.5 Million Records Breached 

Hacking

 

Health Insurer Excellus Hacked; 10.5 Million Records Breached 

 
 

Health records of 5.5 million US patients accessed in MIE breach

 
 

Healthcare industry sees 340% more security incidents than the average industry

 

1.9.2015

Here's How Iranian Hackers Can Hack Your Gmail Accounts

 
 

Here's How SIEM Can Protect Your Privileged Accounts in the Enterprise

Security

 

Here's How to Decrypt Hydracrypt & Umbrecrypt Ransomware Files

Virus

 

Here's How to Stop Windows 7 or 8 from Downloading Windows 10 Automatically

Windows

 

Here's How Websites Are Tracking You Online

Security

 

Here's the Facebook Hacking Tool that Can Really Hack Accounts, But...

Social site

31.8.2015

Here's Top Features Expected in Next iPhone Release

 
 

Here's Why Microsoft Drops a Cloud Data Center Under the Ocean

Technologies

 

Hey ISIS! Check Out How 'Idiot' Anonymous Hackers Can Disrupt your Online Propaganda

ISIS

 

Hey, Apple User! Check If You are also Affected by the Sparkle Vulnerability

Apple

 

Hidden Data Economy Report Exposes Price Points for Stolen Data

Crime

 

Hidden tear and its spin offs

Virus

 

High prevalence of personal health information at risk

 
 

High severity Internet Explorer 11 vulnerability identified after Hacking Team breach

 
 

High school Student Hacked Into CIA Director's Personal Email Account

Hacking

 

High-impact DoS flaw patched in Node.js, update as soon as possible

 
 

High-Profile Targets Attacked via Software Update Mechanism 

 
 

High-Risk SAP HANA Vulnerabilities Patched

 
 

Hilton confirms some payment systems infected by malware

Virus

 

Holes Patched in Online Bookmarking App Pocket

 
 

Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records

Virus

 

Hope is not a strategy, we need more healthy paranoia

 
 

Hospitals advised to stop using vulnerable computerized drug pumps

 
 

Hotel Chain Hilton Worldwide Investigating Potential POS Breach 

 
 

How A Drone Can Infiltrate Your Network by Hovering Outside the Building

Security

 

How Amazon Employee bought 'Google.com' Domain for Only $12 from Google

Technologies

 

How are businesses responding to cyber risks?

 
 

How attackers attempt to infect organizations

 
 

How BitTorrent activity impacts security ratings

 
 

How boards calibrate strategy and risk

 
 

How businesses interpret and use threat intelligence

 
 

How can we decide on surveillance and privacy when we can't see the whole picture?

 
 

How CoinVault or Bitcryptor victims could try to recover their files

Virus

 

How companies can regain consumer trust after a data breach

 
 

How complex attacks drive the IT security innovation race

 
 

How do you ensure success with DevOps?

 
 

How does the ISIS control the Internet?

ISIS

 

How engaged is the average board when it comes to security?

 
 

How experts stay safe online and what non-experts can learn from them

 
 

How fake users are impacting business through acts of fraud and theft

 
 

How gamers can help improve critical software security

 
 

How Hackers Can Hack Your Chip-and-PIN Credit Cards

Hacking

 

How Just Opening an MS Word Doc Can Hijack Every File On Your System

Hacking

 

How lack of trust and limited knowledge impact your organization

 
 

How many employees present a cloud security risk?

 

17.10.2015

How NSA successfully Broke Trillions of Encrypted Connections

BigBrothers

 

How online fraud will evolve in 2016

 
 

How organizations can increase trust and resilience

 
 

How Some Chinese Hackers Started Making Big Money

Hacking

 

How Spy Agencies Hacked into Israeli Military Drones to Collect Live Video Feeds

NSA

 

How The Russian Abused Twitter as C&C in Hammertoss Malware? Python Answers

Virus

 

How the threat landscape will change by 2020

 
 

How to Activate GodMode in Windows 10

Windows

 

How to Auto-BackUp Your WhatsApp Data to Google Drive with Encryption

Security

 

How to avoid data breaches? Start by addressing human error

 
 

How to become a nightmare for cyber attackers

 
 

How to become an Information Security Expert with the CISSP Certification

Security

 

How to Build a Successful Incident Response Plan

Security

 

How to convert 30$ D-Link DCS web cameras into a backdoor

Vulnerebility

 

How to Crack GCHQ Crypto Puzzle? — Here's the Solution

NSA

 

How to Crash Your Friends' WhatsApp Just By Sending Crazy Smileys

Security

 

How to Detect IE Zero-day Exploit Used to Deploy Korplug Malware

Exploit

 

How to extract PIN from any selfie, is biometrics secure?

Security

 

How to find a free, secure proxy service?

 
 

How to Fix Chrome Massive Memory Usage? Simply Try 'Chrome 45' for Faster Performance

Software

 

How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

Hacking

 

How to hack airbag in Audi TT on other models

Hacking

 

How to Hack and Decrypt WhatsApp Database on rooted devices

Hacking

 

How to Hack WiFi Password from Smart Doorbells

Hacking

 

How to hide from surveillance cameras: the past and the future

Technologies

 

How to improve Internet security after the disclosure of the Diffie-Hellman flaw

Vulnerebility

 

How to Install Android 6.0 Marshmallow and When will Your Smartphone Get it?

Android

 

How To Keep Your Android Phone Secure

Android

 

How to protect your privacy on Windows 10

 
 

How to Protect Yourself against XcodeGhost like iOS Malware Attacks

Apple

 

How to Root Windows Phone and Unlock the Bootloader to Install Custom ROMs

Hacking

 

How to Run Multiple Android apps on Windows and Mac OS X Simultaneously

Apple

 

How to silently control a mobile phone from 16 Feet Away

Security

 

How to steal Jaguar XFR cars in 60 seconds by hacking them

Security

 

How to Steal Secret Encryption Keys from Android and iOS SmartPhones

Apple

 

How to survive a compliance audit

 
 

How to thwart the passcode lock screen on iOS 8 and 9?

Apple

 

How to Turn Any Non-Touch Screen PC Into a Touch Screen

Security

 

How to turn on two-factor authentication on over 100 popular online services 

 
 

How to turn on two-factor authentication on over 100 popular online services 

 
 

How to use GCAT backdoor with Gmail as a C&C server

Virus

 

How To Use WhatsApp Web Client on iPhone and Other iOS Devices

Apple

 

How trustworthy are the world's leading websites?

 
 

How UK businesses plan to tackle security threats in 2016

 
 

How you can anonymously use public Wi-Fi from miles afar

 
 

How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room

Security

 

HP Laptop Audio Driver Acts as Keylogger 

 
 

HP releases exploit code for IE zero-day that Microsoft won't patch

 
 

HSBC online banking services offline due to a DDoS attack

Cyber Attack

 

HTC phone stores fingerprints in easily accessible plaintext

 
 

HTML5 Security Cheat Sheet

 
 

HTTP error code 451 will signal online censorship

 
 

HTTPS Available as Opt-In for Blogspot

 
 

HTTPS Bicycle attack reveals password length, allows easier brute-forcing

 
 

Huawei 3G routers rife with flaws

 
 

Huge Flash Update Patches More Than 30 Vulnerabilities

 
 

Human behaviour still the biggest threat to company security

 
 

Human error reduces security offered by encryption apps

 
 

Hundreds of Apps Using Ultrasonic Signals to Silently Track Smartphone Users

 
 

Hundreds of thousands of engine immobilizers remotely hackable

Hacking

 

Hyatt Hotel Says Payment Systems Hacked with Credit-Card Stealing Malware

Virus

 

Hyatt hotels data breach, 250 hotels impacted in 50 countries

Crime

 

Chakra JavaScript Engine: Microsoft Open-Sources the Heart of Edge browser

Vulnerebility

 

Charlie Miller to Leave Twitter Security Team

 
 

Check out data-centric security solutions at Infosecurity Europe

 
 

Check out the Windows 10 security features

 
 

Cherry Picker, a PoS Malware even more threatening

Virus

 

Chikdos cross-platform DDoS botnet hit SQL servers worldwide

Security

 

Chimera, a new strain of ransomware in the wild

Virus

 

China — OPM Hack was not State-Sponsored; Blames Chinese Criminal Gangs

Hacking

 

China APT Gang Targets Hong Kong Media via Dropbox

 
 

China arrested hackers responding to a US Government request

Hacking

 

China arrested hackers suspected of OPM hack

Hacking

 

China blamed for cyber attack on Bureau of Meteorology computer

Cyber Attack

 

China is the top target for DDoS reflection attacks

 
 

China Passes Anti-Terrorism Law; Here's What You Need to Know

Security

 

China passes its first Anti-Terrorism law

Security

 

China spies on airline passengers with IMSI-catchers

Security

 

China-Linked Spies Use Recent Zero-Day to Target Financial Firms

 
 

Chinese fraudsters are hijacking and misusing Uber accounts

 
 

Chinese hackers arrested at US request

 
 

Chinese Hackers Breached LoopPay for cyber espionage through Samsung Pay

Hacking

 

Chinese hackers target Taiwanese Opposition Party and media

Cyber Attack

 

Chinese Hackers tried to Take Down Tibetan Social Networking Website

Hacking

 

Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

Virus

 

Chinese ISPs Caught Injecting Ads and Malware into Web Pages

Virus

 

Chinese Mobile Ad Library Backdoored to Spy on iOS Devices

 
 

Chinese TA459 APT exploits CVE-2017-0199 flaw to target Financial firms

 
 

Chip-and-PIN Credit Cards and The Deadline: Here's What You need To Know

Security

 

Chrome exploit leaves million Android devices open to attack

Android

 

Chrome extension thwarts user profiling based on typing behavior

 

Chrome extensions easily disabled without user interaction

 

Chrome Zero-day Exploit leaves MILLIONS of Android devices vulnerable to Remote Hacking

Vulnerebility

 

I am HDRoot! Part 1

Security

 

IBM cloud tool enables privacy-preserving user authentication

 
 

IBM Supply Chain Breached as Storwize USBs Ship With Malware 

 
 

iCloud Keychain vulnerability allowed hackers to Steal sensitive data

 
 

Identify and track sensitive corporate data in real-time

 
 

Imperfect algorithms threaten democracy

 
 

In Wake of Cyberattacks, U.S. Readies Sanctions Against China

Cyber Attack

 

Incredible! Someone Just Hacked 10,000 Routers to Make them More Secure

Hacking

 

India temporarily Bans Facebook's Free Internet Service

News

 

Indicators of compromise as a way to reduce risk

Security

 

Industrial Robots Vulnerable to Remote Hacker Attacks 

 
 

Industrial security awareness continues to remain low

 
 

Info of 2.4 million Carphone Warehouse customers stolen

 
 

Infographic: Devaluing data, fighting cybercrime

 
 

Information security and privacy are crucial for EU growth

 
 

Information security governance practices are maturing

 
 

Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked

 
 

Information security: A key issue in the 2016 U.S. presidential campaign?

 
 

Infosec pros are moving beyond traditional passwords

 
 

Infosec pros have little confidence in UK's cybersecurity readiness

 
 

Infosecurity Europe 2015, expo floor

 
 

Innovative security research comes to Singapore

 
 

Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking

 
 

Inside the German cybercriminal underground

Hacking

 

Inside the largely unexplored world of mainframe security

 
 

Inside the Unpatched OS X Vulnerabilities

 
 

Insider threat: A crack in the organization wall

 
 

Insider trading ring hacked into newswire services, raked in $100M based on stolen info

 
 

Instagram Adds Two-Step Verification to Prevent Account from being Hacked

Social site

 

Installation of Tor Relay in Library Attracts DHS Attention 

 
 

Instapaper for Android vulnerable to man-in-the-middle attacks

 
 

Intel establishes automotive security review board

 
 

Intel Warns of Critical Vulnerability in Processor Firmware

 
 

Intelligent packet capture for increased network visibility

 
 

InterApp, the device that can hack any Smartphone

Mobil

 

Internet Root Name Servers Survive Unusual DDoS Attack

 
 

Internet root servers flooded with 5 million queries a second

Computer attack

 

iOS 9 boosts iPhone 6s and iPad Pro security with improved 2FA

Apple

 

iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode

Apple

 

iOS 9 partially fixes critical, easily exploitable AirDrop bug 

 
 

iOS 9 partially fixes critical, easily exploitable AirDrop bug 

 
 

iOS 9 security flaw lets attackers access device through Siri

Apple

 

iOS AirDrop vulnerability allows for malware installation on Apple devices

Apple

 

iOS Masque Attack Weaponized: A Real World Look

Apple

 

iOS Mobile Banking Apps, what is changed from 2013 tests?

Apple

 

iOS Sandbox Vulnerability Puts Enterprise Data at Risk

Apple

 

IoT attacks and evasion techniques will characterize threats in 2016

 
 

IoT developers concerned about privacy and data protection

 
 

IoT devices are re-using cryptographic keys, leaving in danger millions of devices

Hacking

 

IoT devices: The good, the bad and the ugly

 
 

IP camera manufacturers force researcher to pull conference talk

 
 

Ipswitch offers secure managed file transfer analytics and reporting

 
 

Iranian Cleaver hackers exploit LinkedIn for cyber espionage

Security

 

Iranian Government says Daesh doesn’t pose a threat to Iran

Security

 

Iranian hackers compromised former IDF chief’s computer

Hacking

 

Iranian Hackers Exploit Recent Office 0-Day in Attacks: Report 

 
 

Iranian Hackers focus their efforts in Android RATs

Android

 

Iranian hackers penetrated computers of a small dam in NY

Hacking

 

IRS Hack May Implicate Three Times As Many Taxpayers Than Expected

 
 

IRS is warning taxpayers of a new surge in tax-related incidents

Security

 

IS hackers are attacking the US energy grid

 
 

Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father

Technologies

 

Is Play Station Network under attack? Users reported issues

Cyber Attack

 

Is the Cybersecurity Act of 2015 effective?

 
 

Is the North Korea behind the attack on the Seoul Subway Operator?

Computer attack

 

Is This Security-Focused Linux Kernel Really UnHackable?

Security

 

Is this the death knell for the RC4 encryption algorithm?

 
 

Is Vuvuzela the most secure SMS text messaging system?

Android

 

Is your board ready for a security incident?

 
 

ISC's infocon turns yellow to reflect critical impact of Juniper backdoors

 
 

iSight Partners says the Sandworm APT is involved Ukrainian power outage

Virus

 

ISIS – The first man charged of cyber terrorism has been extradited to the US

ISIS

 

ISIS Calls Anonymous "IDIOTS" and Issues 5 Lame Tips for its Members to Avoid Getting Hacked

ISIS

 

ISIS Hacker who Passed U.S. Military Data to Terrorists Arrested in Malaysia

ISIS

 

ISIS members have developed a mobile app for its communications

ISIS

 

ISIS offers hackers up to $10,000 to hack govt websites

ISIS

 

ISIS operation security guide gives insight into group's cybersecurity practices

 
 

ISIS recruited experts set to wage chemical and biological attacks

ISIS

 

ISIS Supporter Hacks 54,000 Twitter Accounts and Posts Details of Heads of the CIA and FBI

ISIS

 

Islamic State launches the Kybernetiq magazine for cyber jihadists

ISIS

 

Isle of Man taxpayers' info leaked due to email error

 
 

Israeli Electrical Power Grid Suffers Massive Cyber Attack

Cyber Attack

 

Israeli Public Utility Authority hit by a severe cyber attack

Cyber Attack

 

IT admits obstacles to user mobility due to security concerns

 
 

IT priorities are changing: Cloud-first strategy to rise

 
 

IT Security in SMEs: Guidelines published by UNICRI

Security

 

IT teams expect a nightmare during the holidays

 
 

IT threat evolution in Q2 2015

REPORTS

 

IT threat evolution in Q3 2015

Security

 

IT use of cloud surges to record heights

 
 

It Works! Google's Quantum Computer is '100 Million Times Faster' than a PC

Security

 

It’s official! People want a more trustworthy Internet

 
 

Italian intelligence plans to monitor also communications through the Playstation

Security

 

It's not just about Big Data, it's what you do with it

 
 

It's Now Legal to Jailbreak Smart TV, Smartphone Or Tablet

Apple

 

It's official: The average DDoS attack size is increasing

 
 

It's undeniable, IoT will change security forever

 
 

Ivan Ristic and SSL Labs: How one man changed the way we understand SSL

 
 

Jail Authorities Mistakenly Early Released 3,200 Prisoners due to a Silly Software Bug

Security

 

January Android security update fixes 5 critical flaws, removes unneeded component

 
 

Japanese Banking Trojan Shifu Combines Malware Tools

Virus

 

JavaScript DDoS Attack Peaks at 275,000 Requests-Per-Second

Computer attack

 

Jenkins patched a critical RCE flaw in its open source automation server

 
 

Jessy Irwin on Password Security, Opsec and User Education 

 
 

JetAudio and JetVideo media player vulnerability allows arbitrary code execution

 
 

Joomla 3.4.5 patches Critical SQL Injection Vulnerability

Vulnerebility

 

Joomla SQL Injection Vulnerability exploited in the wild

Vulnerebility

 

Joomla under attack due to a zero-day. Patch your CMS now!

Computer attack

 

Joomla Update Patches Critical SQL Injection Vulnerability

 
 

JPMorgan Hack — Three Men Charged in Biggest Bank Hack in History

Hacking

 

JPMorgan hackers also hacked an anti-fraud corporation

Hacking

 

JSPatch hot patching technique puts iOS users at risk

Apple

 

Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI

Security

 

Juniper Backdoor Picture Getting Clearer

 
 

Juniper Firewalls with ScreenOS Backdoored Since 2012

Hardware

 

Juniper to kill off Dual_EC RNG in ScreenOS following new backdoor revelations

 
 

Juniper will drop a function alleged developed by the NSA for surveillance

NSA

 

Just $1400 to build an IMSI catcher like device to track phones

Security

 

Just Like Old Days: IOT Security Pits Regulators Against Market 

 
 

Just Like Windows 10, Windows 7 and 8 Also Spy on You – Here’s How to Stop Them

Privacy

 

Just One Device? No, Government wants Apple to Unlock 12 More iPhones

Apple

 

Kanye West, Who wants to destroy ‘The Pirate Bay’, Caught using Torrent Site

Security

 

Karma Police, how GCHQ tried to track every visible user on Internet

NSA

 

Kaspersky DDoS Intelligence Report for Q4 2015

Computer attack

 

Kaspersky DDoS Intelligence Report Q3 2015

Security

 

Kaspersky Lab APT Trends report, Q1 2017 – From Lazarus APT to StoneDrill

 
 

Kaspersky Security Bulletin 2015. Top security stories

Cyber Attack

 

Kaspersky Security Bulletin. 2016 Predictions

Security

 

Kaspersky Security Bulletin. Spam and phishing in 2015

Security

 

Kazakhstan makes it Mandatory for its Citizens to Install Internet Backdoor

Virus

 

KeeFarce Hacking tool steals encrypted credentials from KeePass password manager

Hacking

 

Keep your site more secure with WordPress 4.3

 
 

Kemoge – Malicious Android Adware Infects Devices worldwide

Virus

 

Kemoge Android Adware Campaign Can Lead to Device Takeover 

 
 

Kemoge: Latest Android Malware that Can Root Your Smartphone

Android

 

KeRanger, the new MAC OS X ransomware that hit Apple users on the weekend

Apple

 

Key developments on the cyber threat landscape in 2016

 
 

Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims

 

31.8.2015

Keyraider-malware-steals-certificates-keys-and-account-data-from-jailbroken-iphones

 
 

KILLER! Unpatched WinRAR Vulnerability Puts 500 Million Users At Risk

Vulnerebility

 

Kim Dotcom loses Fight Against Extradition to the US

News

 

Kim Dotcom's Decentralized Internet — For You, Powered By You

Technologies

 

Kingston releases encrypted USB with keypad access

 
 

Lack of skills and recruiting among challenges facing information security profession

 
 

Lack of visibility and security concerns hinder cloud adoption

 
 

Large Companies Lack Clear Vision on Industrial IoT 

 
 

Lasers can ‘immobilize driverless cars’

Hardware

 

LastPass 4.0 features fresh UX, emergency access, sharing center

 
 

LastPass breached, hashed master passwords compromised

 
 

LATENTBOT, one the highly obfuscated backdoor in the wild

Virus

 

Latest APT 28 Campaign Incorporates Fake EFF Spearphishing Scam

APT

 

Latest EMET Bypass Targets WoW64 Windows Subsystem

 
 

Latest iOS 9.0.1 Update Failed to Patch Lockscreen Bypass Hack

Apple

 

Latest Windows 10 May Have a Linux Subsystem Hidden Inside

OS

 

Law enforcement arrested operators behind the MegalodonHTTP Botnet

Security

 

Law Enforcement raided DDoS extortion group DD4BC

Computer attack

 

Leaked Hacking Team emails show Saudi Arabia wanted to buy the company

 
 

Lenovo Caught (3rd Time) Pre-Installing Spyware on its Laptops

Virus

 

Lenovo Patches Vulnerabilities in System Update Service 

 
 

Lenovo SHAREit affected by hard-coded password and many other flaws

Vulnerebility

 

Lenovo warns of IBM Storwize shipped with infected initialization USB drives

 
 

Let’s Encrypt Hits Another Free HTTPS Milestone

 
 

Let’s Encrypt Initiative Enters Public Beta

 
 

Let's Encrypt CA releases transparency report before its first certificate

 
 

Let's Encrypt CA to issue its first cert

 
 

Let's Encrypt Free SSL/TLS Certificate Now Trusted by Major Web Browsers

Security

 

Let's Encrypt Project issues its First Free SSL/TLS Certificate 

Kryptografie

16.9.2015

Let's Encrypt Project issues its First Free SSL/TLS Certificate 

Kryptografie

 

Li-Fi is 100 times Faster than Wi-Fi Technology: Real-World Tests Prove

Technologies

 

Like it or not, Microsoft Plans to Push Windows 10 Upgrade more Aggressively

Windows

 

Linksys wireless routers are open to cyber attacks

Cyber Attack

 

Linode forces password reset for all users due to suspected breach

 
 

Linux container security and certification concerns remain

 
 

Linux Foundation Launches 'Zephyr', a tiny OS for Internet of Things

OS

 

Linux Fysbis Trojan, a new weapon in the Pawn Storm’s arsenal

Virus

 

Linux machines can be "owned" by hitting backspace 28 times

 
 

Linux Mint was hacked, website served malicious ISO on Saturday

Hacking

 

Linux ransomware already infected at least tens of users

Virus

 

Linux x86_64 Bindshell with Password (92 bytes) 

 
 

Linux XOR DDoS Botnet delivers potent DDoS attacks

Computer attack

 

List of approved Windows 10 compatible security products

 
 

LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones

Virus

 

Locky Ransomware uses AES to encrypt Local Files and Unmapped Network Shares

Virus

 

LogMeIn to acquire LastPass for $125 million

 
 

Long-term skills shortage drives tech salaries up

 
 

Looks like mobile device security is on nobody's mind

 
 

LowLevel04 ransomware exploits Remote Desktop to spread

Virus

 

Mabouia: The first ransomware in the world targeting MAC OS X

Apple

 

Mac OS X is the software with most vulnerabilities in 2015

Apple

 

Macron Blasts Huge Hacking Attack Just Before French Vote 

 
 

'Macronleaks': Hackers Find Flaw in French Cyber-Fortress 

 
 

MagSpoof: A device that spoofs credit cards, disables chip-and-PIN protection

 
 

Major browser makers synchronize end of support for RC4

 
 

Major Xen update fixes over 20 vulns, including guest/host escape flaw

 
 

Malicious advertisements surge! 260% spike in 2015

Virus

 

Malicious spam campaign capitalizes the global interest in the Zika virus

Security

 

Malvertisers abused Yahoo’s ad network for days

Virus

 

Malvertising attack hit The Economist, anti-ad blocking service PageFair hacked

Virus

 

Malvertising campaign targeted the Forbes Website, million users at risks

Virus

 

Malware Hunter, the project developed by Shodan and Recorded Future to find C&C Servers

 
 

Malware on the Smart TV?

Virus

 

Malware threats on pirated content sites

 
 

Malware-based attack targets America’s Thrift Stores

Virus

 

Malwarebytes hardly working to fix flaws in its antivirus

Virus

 

Malwaresearch – A command line tool to find malware on Openmalware.org

 
 

Man gets 50 months in prison hacking U.S.-based financial institutions

 
 

Man charged of Laundering $19.6 Million earned with PBX system hacking

Hacking

 

Man stole special agent's identity, executed a complex identity theft scheme

 
 

Manipulating WSUS to Own Enterprises

 
 

Many popular Android apps fail to encrypt login credentials

 
 

Map a path through the issues of cloud, security, data analytics

 
 

Mapping the underground cybercrime economy in order to disrupt it

 
 

Mark Zuckerberg Plans to Build Iron Man's JARVIS like Artificially Intelligent Assistant

Technologies

 

Mark's Milestone: 1 Billion People Uses Facebook in A Single Day

Social site

 

Maru OS — Android ROM that Turns into Debian Linux When Connected to a PC

Android

 

Mass adoption of mobile payment services derailed by security, privacy concerns

 
 

Massive campaign uses router exploit kit to change routers' DNS servers

 
 

Mastercard is trying out purchase verification with selfies

 
 

Mazar Bot actively targeting Android devices and wiping them

Android

 

McAfee study on the prices of stolen data on the Dark Web

Crime

 

Meet Linux's New Fastest File-System – Bcachefs

OS

 

Meet The World's First Person Who Hacked His Body to Implant a Bitcoin Payment CHIP

Hacking

 

Meet World's Fastest Wi-Fi Router (Looks Like an Alien)

Hardware

 

Microsoft 'Accidentally' pushed 'Test patch' Update to All Windows 7 Users

Windows

 

Microsoft bans Superfish-like adware methods starting in March 2016

Virus

 

Microsoft Collecting More Data of Windows 10 Users than Initially Thought

Security

 

Microsoft Considers Earlier SHA-1 Deprecation Deadline

 
 

Microsoft Cracks Down on Toolbars, Unsigned DLLs with Edge Update 

 
 

Microsoft details how Device Guard fights malware in Windows 10

 
 

Microsoft doesn’t want Windows 10 Users to Switch to Chrome or Firefox

Windows

 

Microsoft Edge: New browser, new risks for Windows 10

 
 

Microsoft Edge's InPrivate Mode Finally Keeps Your Activity Private

Security

 

Microsoft expands Bug Bounty programs, increases rewards

 
 

Microsoft Fixes Antimalware Engine Flaw Found by Google Experts 

 
 

Microsoft fixes critical flaws in all versions of Windows and Office

 
 

Microsoft fixes critical vulnerabilities affecting Windows and Office

Vulnerebility

 

Microsoft fixes Microsoft Malware Protection Engine RCE vulnerability CVE-2017-0290 found by Google

 
 

Microsoft flags Ask toolbar as unwanted and dangerous

 
 

Microsoft has Built its own Linux Operating System

Technologies

 

Microsoft Chooses Ubuntu Linux for their Cloud-based Azure HDInsight Big Data Solution

Technologies

 

Microsoft is Auto-Downloading Windows 10 to PCs, Even If You Don't Want it 

Windows

11.9.2015

Microsoft is Auto-Downloading Windows 10 to PCs, Even If You Don't Want it 

Windows

 

Microsoft Issues Emergency Patch For Critical RCE in Windows Malware Scanner

 
 

Microsoft issues emergency patch for IE flaw exploited in the wild

 
 

Microsoft Issues Patches for Another Four Zero-Day Vulnerabilities

 
 

Microsoft Keeps Backup of Your Encryption Key on it's Server — Here's How to Delete it

Security

 

Microsoft kills many critical flaws, some 0-days, un-trusts one wildcard cert

 
 

Microsoft Kills SHA-1 Support in Edge, Internet Explorer 11 

 
 

Microsoft maintains the recovery key of your new PC

Security

 

Microsoft Opens .NET Core, ASP.NET Bug Bounties

 
 

Microsoft Outlook flaw opens the door to “mailbomb” attacks

Computer attack

 

Microsoft Patch Tuesday updates for May 2017 fix Zero Days exploited by Russian APT groups

 
 

Microsoft Patches Critical Vulnerabilities in New Edge Browser

 
 

Microsoft Patches Edge Flaws Disclosed at Pwn2Own 

 
 

Microsoft Patches Graphics Component Flaw Under Attack

 
 

Microsoft Patches Zero-Days Exploited by Russia-Linked Hackers 

 
 

Microsoft Pays $24,000 Bounty to Hacker for Finding 'Account Hacking' Technique

Hacking

 

Microsoft plugs another Windows zero-day with emergency patch

 
 

Microsoft pushes out security updates, plugs holes actively exploited by attackers

 
 

Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches) 

Vulnerebility

9.9.2015

Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches) 

Vulnerebility

 

Microsoft Responds To Windows 10 Spying Concerns, But It will Still Collect Your Data

Privacy

 

Microsoft Revokes Trust for Certificates Leaked by D-Link

 
 

Microsoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE

Vulnerebility

 

Microsoft Security Updates January 2016

Vulnerebility

 

Microsoft Security Updates November 2015

Security

 

Microsoft Security Updates October 2015

Vulnerebility

 

Microsoft Starts automatically Pushing Windows 10 to all Windows 7 and 8.1 Users

OS

 

Microsoft WARNING — 'Use Windows 7 at Your Own Risk'

Security

 

Microsoft warns of imminent end of support for all but the latest Internet Explorer versions

 
 

Microsoft will add SSH support to PowerShell

 
 

Microsoft will Inform You If Government is Spying on You

Security

 

Microsoft will stop trusting certificates from 20 Certificate Authorities

 
 

Microsoft Windows 10 is now Installed on over 200 Million Devices

OS

 

Microsoft, Law Enforcement Collaborate in Dorkbot Takedown

 
 

Microsoft's new security posture leads to baked-in security

 
 

Mikko Hyppönen warns the ISIS has a credible offensive cyber capability

ISIS

 

Million CISCO ASA Firewalls potentially vulnerable to attacks

Vulnerebility

 

Millions affected by Scottrade brokerage breach that dates back two years

 
 

Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys

Security

 

Millions of smart devices at risk from 3-year-old flaw

Android

 

Millions of smartphones, IoT devices risk compromise due to 3-year-old bug

 
 

Misconfigured MongoDB allowed manipulation of a Microsoft’s career portal

Vulnerebility

 

Mission '1 Billion' — Microsoft will Automatically Offer Windows 10 Upgrade

Windows

 

Mission: Hacking Grandma. Level: piece of cake

Hacking

 

MIT Develops Hack-Proof RFID Chip — Here's How It Works

Hacking

 

MIT Scientists: Now You Can See Through Walls with Wi-Fi

Technologies

 

Mobile ad network exploited to launch JavaScript-based DDoS attack

 
 

Mobile Ad Network exploited to run a major DDoS Attack

Android

 

Mobile malware evolution 2015

Mobil

 

Mobile payments data breaches expected to grow

 
 

Mobile users continue to put personal and corporate data at risk

 
 

Model Assesses Readiness to Accept Outside Vulnerability Reports

 
 

Modern railroad systems vulnerable to cyber attacks

Cyber Attack

 

ModPos, the most complex POS malware ever seen

Virus

 

Moonpig Warns Customers of ‘Security Issue’

 
 

More than 100 Million Android users at risk due to the Baidu Moplus SDK

Android

 

More than 250 iOS Apps Caught Using Private APIs to Collect Users' Private Data

Apple

 

More than 900 embedded devices share hard-coded certs, SSH host keys

 
 

More than a third of employees would sell company data

 
 

Most are concerned about security of healthcare data

 
 

Most are unaware of the seriousness of medical data theft

 
 

Most companies don't believe their information security meets their organization's needs

 
 

Most consumers believe cloud-based apps can be hacked

 
 

Most consumers concerned about becoming victims of online crime

 
 

Most employees are not malicious, but their carelessness can be just as damaging

 
 

Most employees don't understand the value of data

 
 

Most IT pros oppose government backdoor access

 
 

Most security executives lack confidence in their security posture

 
 

Most vulnerabilities on enterprise networks are two years old

 
 

Mozilla Embraces Private Browsing with Tracking Protection in Firefox 42

 
 

Mozilla increases rewards given out to bug hunters

 
 

Mozilla Patches Bug Used in Active Attacks

 
 

Mozilla Tells Symantec to Accept Google's CA Proposal 

 
 

Mr. Grey Hacker (Wanted by FBI) Steals 1.2 BILLION Login Passwords

Hacking

 

mSpy finally admits they've been hacked 

 
 

mSpy finally admits they've been hacked 

 
 

Musical Chairs Campaign Found Deploying New Gh0st RAT Variant 

 
 

My Government Doesn't Understand How Encryption and Cyber Security Work

Security

 

N3XT — Advanced CHIP that Could Make Your Computer 1000 Times Faster

Technologies

 

Naikon APT Group backed by the Chinese PLA Unit 78020

APT

 

Naikon APT Group Tied to China’s PLA Unit 78020

Cyber Attack

 

NASA hacked by AnonSec that hijacked a $222m Global Hawk drone

Hacking

 

NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean

Hacking

 

Nasdaq to Use Bitcoin-style Blockchain to Record Shareholder Votes

Technologies

 

NATO Locked Shields 2017, world’s largest cyber defence exercise just ended

 
 

NCA launched #CyberChoice campaign, to prevent youngsters become cyber criminals

Cyber Attack

 

Nearly 2% of all smartphones are compromised or high risk

 
 

Nearly 2,000 Vodafone UK customers' accounts compromised, blocked

 
 

Nearly all websites have serious security vulnerabilities

 
 

Nemesis Bootkit — A New Stealthy Payment Card Malware

Virus

 

NeoKylin: China's Linux OS that Seriously Looks Like Windows XP

APT

 

Nest camera, has a different definition for Turn off Mode

Security

 

Nested backdoor affects 600,000 Arris cable modems

Virus

 

Netflix Sleepy Puppy Awakens XSS Vulnerabilities in Secondary Applications

 
 

Netgear Nighthawk X4S AC2600 Smart WiFi Router released

 
 

Netgear Patches RCE Flaws in Routers, Switches 

 
 

Netgear Published Patched Firmware for Routers Under Attack

Computer attack

 

Netgear Published Patched Firmware for Routers Under Attack 

 
 

Netgear Router Exploit in the wild

Hacking

 

Netrepser Cyber espionage campaign compromised hundreds of Government organizations worldwide

 
 

Network protocol analyzer Wireshark 2.0 released

 
 

Network security firewalls approach $1 billion in 2Q15

 
 

Network Time Protocol flaws can cause chaos on a global scale

Security

 

Neverquest Trojan Ceases Operations 

 
 

New "Do Not Track" standard released

 
 

New "Dok" Mac OSX Malware Steals Sensitive Data 

 
 

New Android bug can put devices into a coma

 
 

New Android malware could inflict $250,000 of losses

Android

 

New Android Ransomware Communicates over XMPP

 
 

New Apple Gatekeeper bypass can allow running rouge applications

Apple

 

New Attack Targeting Microsoft Outlook Web App (OWA) to Steal Email Passwords

Computer attack

 

New attacks on critical communications infrastructure in the US

Computer attack

 

New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps

BotNet

 

New Bug in Bugzilla Software Could Expose Zero-Day Vulnerabilities

Vulnerebility

 

New Campaign Shows Dridex Active, Targeting French

 
 

New Cerber Ransomware Variant Emerges 

 
 

New date for migrating off vulnerable SSL and early TLS encryption

 
 

New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers

 
 

New Debian Releases Fix PHP, VirtualBox Bugs

 
 

New docs confirm CIA planned to kidnap Snowden

NSA

 

New Drupal versions fix admin account hijack flaw

 
 

New Dyre variant can target Windows 10 and Microsoft Edge users

 
 

New Dyre variant in the wild supports Windows 10 and Microsoft Edge

Android

 

New EU rules on data protection put the citizen back in the driving seat

 
 

New exploit steals secret cryptographic keys from mobile devices

Mobil

 

New flash storage architecture capable of 1TB/s

 
 

New Google Drive phishing campaign exposed

 
 

New HackingTeam OS X RCS spyware in the wild, who is behind the threat?

Apple

 

New insidious Google Docs phishing scheme is rapidly spreading on the web

 
 

New insight on the Rocket Kitten Iranian hacking crew

Hacking

 

New Joomla release patches a serious SQLi flaw

Vulnerebility

 

New law allows French police to seize and search electronic devices without a warrant

 
 

New Long-Range Wi-Fi Standard Offers Double Range to Home Devices

Technologies

 

New Moker RAT Bypasses Detection

 
 

New OpenSSL versions squash LogJam bug

 
 

New password recovery scam hitting Gmail, Outlook and Yahoo Mail users

 
 

New Persirai IoT Botnet Emerges 

 
 

New RAT Trochilus, a sophisticated weapon used by cyber spies

Virus

 

New SANS course teaches infosec pros how to ruin attackers' day

 
 

New Spy Banker Trojan Telax exploits Google Cloud Servers

Virus

 

New Steam escrow system drives impatient users to fake trading sites serving malware

 
 

New threats will demand new approaches such as micro-segmentation and quantum encryption

 
 

New Tinba Variant Seen Targeting Russian, Japanese Banks

 
 

New Toshiba CMOS image sensor improves recognition and authentication

 
 

New updates on Cyber Conflict Agenda 2016 and what’s new in ‘Cyber power’

REPORTS

 

New Versions of Carbanak Banking Malware Seen Hitting Targets in U.S. and Europe

 
 

New York Judge Rules FBI Can't Force Apple to Unlock iPhone

Apple

 

New York Police Used Cell Phone Spying Tool Over 1000 Times Without Warrant

Mobil

 

Next Hacker to Organize Biggest Java Programming Competition In Germany

Hacking

 

Next year, smart cities will use 1.6 billion connected things

 
 

Nigerian scammers are stealing millions from businesses

 
 

Nine arrested in UK investigation of criminal network defrauding bank customers

 
 

NIST releases SHA-3 cryptographic hash standard

 
 

NIST revises security publication on random number generation

 
 

NIST updates ICS security guide

 
 

North Korea-Linked Hacker Group Poses Serious Threat to Banks: Kaspersky 

 
 

North Korea's Red Star OS (Looks Like Mac OS X) Spies on its Own People

OS

 

Notorious Shm00p hacker Claims he helped the FBI find ISIS Hacker Junaid Hussain

ISIS

 

Nový Chrome rozšíøení pomáhá v boji klávesnice Biometrické profilování

 
 

Now VirusTotal can scan your firmware image for bad executables

Virus

 

Now We Know — Apple Can Unlock iPhones, Here's How to Hack-Proof your Device

Apple

 

NSA announces it will stop surveillance activities on emails, texts and other internet communications

 
 

NSA broke trillions of encrypted connections due to a flaw

NSA

 

NSA Cyber Weapons installed in High Profile Targets in Greece

 
 

NSA Data Center Experiencing 300 Million Hacking Attempts Per Day

NSA

13.10.2015

NSA SHARKSEER program aims to detect and mitigate malware Zero-Day

BigBrothers

 

NSA’s Top-Secret SKYNET May Be Killing Thousands of Innocent Civilians

NSA

 

NSA-linked Spying Malware Infected Top German Official's Computer

NSA

 

NSF Awards $6M Grants for Internet of Things Security

 
 

Nuclear Exploit Kit Spreading Cryptowall 4.0 Ransomware

 
 

Nuclear facilities are wide open to cyber attacks

 
 

Nuclear Threat Initiative says nations not prepared to repel cyber attacks on nuclear facilities

Security

 

Number of WordPress Attacks powered by compromised routers is rapidly dropping

 
 

NY Health Provider Excellus Discloses Data Breach Dating to 2013

 
 

Obama Encryption Policy: White House Will Not Force Companies To Decode Encrypted Data

Security

 

Offline Ransomware is spreading among Russian users

Virus

 

Oh Snap! Lenovo protects your Security with '12345678' as Hard-Coded Password in SHAREit

Security

 

Old MS Office feature can be exploited to deliver, execute malware

 
 

OmniRat RAT is currently being used by criminals in the wild

Virus

 

On Friday, United Nation can decide that Assange is being illegally detained

News

 

On the trail of Stagefright 2

Virus

 

Once again identity thieves use stolen SSNs in IRS attack

Computer attack

 

One in 20 apps on private PCs are end-of-life

 
 

One in 600 websites exposes sensitive info via easily accessible .git folder

 
 

Online summer travel scams to watch out for

 
 

Online Trust Alliance releases new Internet of Things Trust Framework

 
 

Only 37% of SMBs think they're equipped to manage IT security

 
 

Only 5% of organizations protect credentials

 
 

Open source KeeFarce tool loots encrypted passwords stored in KeePass

 
 

Open source security projects get $452,000 from the Linux Foundation

 
 

Open source Sleepy Puppy tool finds XSS bugs in target apps and beyond

 
 

Open source tool checks for vulnerabilities on Android devices

 
 

Open source Twittor tool can control botnets via Direct Messages

 
 

OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography

 
 

OpenSSH 7.0 Fixes Four Flaws

Vulnerebility

 

OpenSSH bug enables attackers to brute-force their way into poorly configured servers

 
 

OpenSSL Patches Bring Last Update for 0.9.8 and 1.0.0 Branches

 
 

Operation Black Atlas, PoS malware is flooding network worldwide

Virus

 

Operation Blockbuster revealed the Lazarus Group Activities

Virus

 

Operation Dust Storm, hackers Target Japanese Critical Infrastructure

Hacking

 

Operation Transparent Tribe targets Indian diplomats and military

Security

 

Operation WilySupply – Software remote update channel of the supply chain exploited as attack vector

 
 

Operational security and cybersecurity come together in Anaheim

 
 

Operators behind Angler Exploit Kit included CryptoWall 4.0

Virus

 

OpKillingBay – Anonymous shut down Japanese airport site to protest against slaughter of Dolphin

Computer attack

 

OPM hack shines light on abysmal state of US federal systems's security

 
 

Oracle agrees to settle FTC charges it deceived consumers about Java updates

 
 

Oracle CSO: You ‘Must Not Reverse Engineer Our Code’

 
 

Oracle Issues Emergency Java Update for Windows

Vulnerebility

 

Oracle Ordered to Publicly Admit Misleading Java Security Updates

Vulnerebility

 

Oracle releases 154 fixes, plugs click-to-play bypass Java flaw used in attacks

 
 

Organizations on the hunt for DevOps, IoT and mobile skills

 
 

Outsourcing critical infrastructure (such as DNS)

Security

 

Over 5,000 mobile apps found performing in-app ad fraud

 
 

OwnStar Attack Now Aimed at BMW, Chrysler, Mercedes Cars

Hacking

 

PageFair Hack Serves Up Fake Flash Update to 500 Sites

 
 

Pair of Bugs Open Honeywell Home Controllers Up to Easy Hacks

 
 

Pair of Drupal Modules Patch Access Bypass Flaws

 
 

Pangu cracking team has released the iOS 9 jailbreak

Apple

 

Paris Attacks — NO! We Can't Blame Edward Snowden and Encryption for Terror Attacks

ISIS

 

Password Security — Who's to Blame for Weak Passwords? Users, Really?

Security

 

Patent Troll — 66 Big Companies Sued For Using HTTPS Encryption

Security

 

Patch now! Adobe releases Emergency Security Updates for Flash Player

Vulnerebility

 

Patch Report: All Versions of Windows affected by Critical Vulnerability

Vulnerebility

 

Patch your Asus RT wireless routers now to avoid ugly surprises

 
 

Patched Android ‘Serialization’ Vulnerability Affects 55 Percent of Devices

 
 

Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden

 
 

Patched Libpng Vulnerabilities Have Limited Scope

 
 

Patreon crowdfunding site hacked and data leaked online

Crime

 

Pawn Storm APT targets MH17 crash investigation

Virus

 

Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the While House

Vulnerebility

 

Pay-by-Selfie – MasterCard is replacing the customer password with his selfie

Security

 

Payment card info of 93,000 Web.com customers stolen

Crime

 

Payment systems at Hyatt Hotels have been compromised

Hacking

 

PayPal stored XSS vulnerability exposed

 
 

PayPal Vulnerability Allows Hackers to Steal All Your Money

Vulnerebility

 

PCs with Intel Server Chipsets, Launched in Past 9-Years, Can be Hacked Remotely

 
 

Pentagon's unclassified email system breached, Russian hackers blamed

 
 

Pen-testing drone searches for unsecured devices

 
 

Persistent cyber spies try to impersonate security researchers

 
 

Persistent XSS flaw in SharePoint 2013 revealed, patched

 
 

Person VUE Credential manager system has been compromised

Security

 

Personal info of 12+ million Dutch mobile phone owners easily accessible to hackers

 
 

Personal info of 15 million T-Mobile USA customers stolen in Experian breach

 
 

Personal info of 4 million US government workers compromised in OPM breach

 
 

Perspectives on the state of Internet security

 
 

Phantom Squad took credit for the PlayStation network outage

Computer attack

 

Phantom Squad wants to take down Playstation network and Xbox Live on Christmas

Hacking

 

Phishers are targeting millions of DHL customers

 
 

Phishers register domain names, hammer traditional targets

 
 

Phishing attacks targeting businesses are escalating

 
 

Phishing campaign leveraging on Dropbox targets Hong Kong media

 
 

Photo gallery: Black Hat USA 2015 Business Hall

 
 

Photo gallery: Black Hat USA 2015, part 2

 
 

Photo: A walk through Cyber Security Europe 2015

 
 

PHP File Manager Riddled With Vulnerabilities, Including Backdoor

 
 

PIN-changing, screen-locking Android ransomware

Android

 

Pirate Bay co-founder Gottfrid Svartholm, aka Anakata, Released from Prison

REPORTS

 

PlayStation 4 Hacked to Run Linux

Hacking

 

Plex forums hacked: IPs, private messages, encrypted passwords compromised 

 
 

Plex forums hacked: IPs, private messages, encrypted passwords compromised 

 
 

Point-and-shoot weapon stops drones without destroying them

 
 

Police Arrest 16-year-old Boy Who Hacked CIA Director

Crime

 

Police Arrested Hackers Who Stole Millions from European ATMs

Hacking

 

Police Body Cameras come with Conficker Worm

Virus

 

Police Can't Force You To Unlock Your Phone, It violates Fifth Amendment Rights

Security

 

Police Raid alleged Bitcoin Creator Craig Wright's Home in Sydney

Technologies

 

Police Using Planes Equipped with Dirtbox to Spy on your Cell Phones

Mobil

 

Ponmocup, never underestimate a botnet that infected 15 million PCs

Virus

 

Popular Android AppLock app full of gaping security holes

 
 

Popular VPNs leak data, don't offer promised privacy and anonymity

 
 

PostgreSQL 9.5: Row level security, Big Data and UPSERT

 
 

Potentially backdoored AMX equipment being used by US President Obama and US Military

Security

 

President Donald Trump Fires the FBI Director James Comey

 
 

Press backspace 28 times to hack a Linux PC with Grub2

Hacking

 

Prevention is the best cure for identity theft

 
 

Prices of stolen data on the Dark Web

 
 

Privacy Badger 1.0 Released With Support For EFF Do Not Track Policy

 
 

Privacy International helps individuals find out if they were spied on by the GCHQ

 
 

Privacy profession: An equal playing field for men and women?

 
 

Private email account of CIA Director compromised by teenage hackers?

 
 

PrivaTegrity might bring an end to Crypto Wars

Security

 

Privatoria — Best VPN Service for Fast, Anonymous and Secure Browsing

Security

 

Privileged accounts are still easy to compromise

 
 

Pro PoS — This Stealthy Point-of-Sale Malware Could Steal Your Christmas

Virus

 

Pro PoS, a new PoS malware available for sale in the underground

Virus

 

Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Security

 

Project Zero Experts Found critical flaws in Samsung Galaxy S6 Edge

Vulnerebility

 

Proposed Wassenaar pact changes will harm cyber defenders instead of attackers

 
 

PROTECTING CYBER VENDOR SERVICES WITH CYBERLAW

Security

 

ProtonMail Back Online Following Six-Day DDoS Attack

 
 

ProtonMail paid a $6000 Ransom to stop DDoS Attacks

Computer attack

 

ProtonMail Paid Hackers $6000 Ransom in Bitcoin to Stop DDoS Attacks

Computer attack

 

ProtonMail restores services after epic DDoS attacks

 
 

PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials

 
 

Qualys announces free global asset inventory service

 
 

Quantum Teleportation — Scientists Teleported Quantum Data over 60 Miles

Technologies

 

R.I.P Ian Murdock, Founder of Debian Linux, Dead at 42

Technologies

 

Ransomware attacks paralyzed at least two German hospitals

Virus

 

Ransomware Attacks Threaten Wearable Devices and Internet of Things

Virus

 

Ransomware demanded $3.6M after takes offline the Hollywood Presbyterian Medical Center

Virus

 

Ransomware infected the UK Parliament’s computer networks

Virus

 

Ransomware will target also Medical Devices

Virus

 

Raspberry Pi Zero — The $5 Tiny Computer is Here

Technologies

 

RaspBSD – FreeBSD distribution for Raspberry Pi

OS

 

Ratopak Trojan – Russian banks under attack

Virus

 

Raw threat data is not effective, it's time for threat intelligence

 
 

RCMP Cybercrime Strategy to fight online crimes

Security

 

Reactions to the Hacking Team breach

 
 

Reactions to the IRS hack that impacted 100,000 people

 
 

Reactions to the LastPass breach

 
 

Real pirates used hacking techniques to raid a shipping company

Hacking

 

Real-World SS7 Attack — Hackers Are Stealing Money From Bank Accounts

 
 

Recently Patched Adobe Flash Versions Hit by Another Zero-day Exploit

Vulnerebility

 

Record-Breaking Deal: Dell to Buy EMC for $67 Billion

News

 

RedLock Emerges from Stealth With Cloud Security Platform 

 
 

Rekoobe a new malware targeting Linux users

Virus

 

Released: New version of REMnux Linux distro for malware analysis

 
 

Reminder! If You Haven't yet, Turn Off Windows 10 Keylogger Now

Windows

 

Remote working on the rise despite security concerns

 
 

Remotely hacking a Nissan LEAF via vulnerable APIs

Hacking

 

Rent the infamous AlienSpy backdoor is now quite easy

Virus

 

Report: German Bank ATMs vulnerable to Hackers

Hacking

 

Report: The changing face of hacking

 
 

Report: What you need to know to earn more in system administration and security

 
 

Researcher hacks house arrest tracking system

 
 

Researcher hacks medical devices and the whole hospital with ease

Hacking

 

Researcher proves how easy it is to pull off homographic phishing attacks

 
 

Researcher releases exploit for OS X 0-day that gives root access

Apple

 

Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager

Hacking

 

Researcher tests Tor exit nodes, finds not all operators can be trusted

 
 

Researcher warns about Security Loopholes in Denmark's Largest Bank

Security

 

Researchers devise passive attacks for identifying Tor hidden services

 
 

Researchers Discover Two New Strains of POS Malware

 
 

Researchers Disrupt Angler Exploit Kit Ecosystem, Derail $30M Ransomware Campaign

 
 

Researchers eliminate coding errors by using good code from "donor" apps

 
 

Researchers Expose Huge Ad Scam Operation 

 
 

Researchers find backdoor bug in NASA rovers' real-time OS

 
 

Researchers hack Corvette via SMS to plugged-in tracking dongle

 
 

Researchers hack Linux-powered sniper rifle

 
 

Researchers hack Vizio Smart TVs to access home network

 
 

Researchers make easy work of Android lockscreen security

Android

 

Researchers map out hard-to-kill, multi-layered spam botnet

 
 

Researchers point out the holes in NoScript's default whitelist

 
 

Researchers spotted a new OS X scareware campaign

Apple

 

Researchers track Android users by collecting accelerator readings

 
 

Researchers Uncover ‘Terracotta’ Chinese VPN Service Used by APT Crews for Cover

 
 

Researchers Uncover New Italian RAT uWarrior

 
 

Researchers-outline-vulnerabilities-in-yahoo-paypal-magento-apps

Vulnerebility

 

Retailers are unaware of sensitive data leaks

 
 

Reuse of login credentials put more than 20M Alibaba accounts at risk

Security

 

Revealed: What info the FBI can collect with a National Security Letter

 
 

Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata

Security

 

'Ridiculous' Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords

Hacking

 

RIP Ray Tomlinson, The Creator of Email, Dies at 74

Technologies

 

Risk management programs lack maturity, new strategies needed

 
 

Risk managers most worried about loss of information confidentiality

 
 

Risks from fraudulent mobile apps and unauthorized app stores

 
 

Risky mobile behaviors are prevalent in the government

 
 

Risky Schneider Electric SCADA Vulnerabilities Remain Unpatched

 
 

Roaming Tiger Hackers targets Russian organizations for espionage

Hacking

 

Rockwell Patches Serious ‘FrostyURL’ PLC Vulnerability

 
 

Rockwell Updates Stratix Routers to Patch Cisco IOS Flaws 

 
 

Rovnix malware is threatening Japanese bank customers

Virus

 

Rowhammer.js: The first remote software-induced hardware-fault attack

 
 

RSA Conference 2016: Connect to protect

 
 

RSA Conference Badge Scanning App has a default password hardcoded

Security

 

RSA Conference opens Innovation Sandbox Contest

 
 

RSA Conference registration page asks Twitter credentials, that’s incredible!

Security

 

RSAUtil Ransomware Distributed via RDP Attacks 

 
 

Russia deploys jamming systems in Syria as tensions rise

Technologies

 

Russia has a new anti wiretapping System

Technologies

 

Russia Wants to Kick Foreign Tech Companies Out Of The Nation

Security

 

Russia, Hackers Stole $4 Million in cash with Reverse ATM Hack method

Hacking

 

Russian Army is largely investing in modern UAVs

Technologies

 

Russian ATM Hackers Steal $4 Million in Cash with 'Reverse ATM Hack' Technique

Hacking

 

Russian financial cybercrime: how it works

Hacking

 

Russian Hackers Manipulate Ruble-Dollar Exchange Rate with Malware

Hacking

 

Russian Hackers suspected for the intrusion of Dow Jones systems

Hacking

 

Russian Metel group manipulated ruble-dollar exchange rate with malware

Virus

 

Russian Nation-state hackers intensify operations in Syria

Hacking

 

Safe Harbor replaced with Privacy Shield

Security

 

Safeguarding data in the healthcare industry

 
 

Sale of legitimate code-signing certs booms on darknet markets

 
 

Salesforce Patches XSS on a Subdomain

Vulnerebility

 

Samsung announces GAIA, a Smart TV security solution

 
 

Samsung disables Windows Update, undermines the security of your devices

 
 

Samsung Get Sued for Failing to Update its Smartphones

Mobil

 

Samsung LoopPay Hacked, but 'Samsung Pay' is Safe

Hacking

 

Samsung Portable SSD T3 offers increased data security and portability

 
 

Samsung presented GAIA, a security solution for Smart TVs

Security

 

San Bernardino shooter’s Apple ID passcode changed in government custody

Apple

 

SanDisk unveils new wireless flash drive

 
 

SAP fixed a flaw in xMII that could open the door to nation-state hackers

Vulnerebility

 

SAP Patches 12 SQL Injection, XSS Vulnerabilities in HANA 

 
 

SAP Patches 17 security flaws, the lowest number of monthly update over the past 6 months

 
 

SAP Patches 17 Vulnerabilities With May 2017 Security Update 

 
 

Save the Date — 11th December: Anonymous to Celebrate 'ISIS Trolling Day'

ISIS

 

Scammers exploit mobile ads for easy profit

 
 

Scammers target citizens filing tax returns online

 
 

Scammers use Google AdWords, fake Windows BSOD to steal money from users 

 
 

Scammers use Google AdWords, fake Windows BSOD to steal money from users 

 
 

Scan of IPv4 Space for ‘Implanted’ Cisco Routers Finds Fewer Than 100

 
 

Scanner Finds Malicious Android Apps at Scale

 
 

Scottrade Breach Affects 4.6 Million Customers

 
 

Script Kiddies can Now Create their Own Ransomware using This Kit

Virus

 

Seagate wireless hard drives open wide to attack

 
 

Second Russian pleads guilty in record US data breach

Hacking

 

Second teen arrested in Connection with the TalkTalk breach

Security

 

Second teenager arrested in connection with TalkTalk hack

 
 

Secret code in color printers enables government tracking

 
 

Section 215 of the Patriot Act expired last night

 
 

Secure messaging service Telegram blocks 78 ISIS-related channels

 
 

Secure networks are the key to unlocking A2P potential

 
 

Securing Hospitals from hackers that can put lives in dangers

Security

 

Securing the smart home environment

 
 

Security concerns continue to dog the cloud industry

 
 

Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems

Security

 

Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea

 
 

Security flaws could allow attackers to steal over 100 different cars

 
 

Security challenges emerging with the rise of the personal cloud

 
 

Security of iMessage System Comes to the Fore Again

 
 

Security pros acknowledge risks from untrusted certificates but take no action

 
 

Security researcher disclosed a WordPress Password Reset Vulnerability

 
 

Security Sandboxes Challenged by Evolving Malware

Technologies

 

Security testing market to grow to $6.9 billion by 2020

 
 

Security update kills several critical bugs in Android Marshmallow

 
 

Security updates for OS X, iOS fix bucketload of serious bugs

 
 

Sen. Warren Worried About Banks’ New Encrypted Messaging Platform

 
 

Senior Bitcoin developer expects a failure of the currency

Technologies

 

Series of Buffer Overflows Plague Many Yokogawa ICS Products 

 
 

Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution

Hacking

 

Several Critical Flaws Patched in Drupal Module

 
 

Severe OpenSSL bug that allows certificate forgery has been plugged

 
 

SHA-2 encryption will make many sites inaccessible to users who can't afford newer tech

 
 

Shadow IT is prevalent in government agencies

 
 

Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service

Android

 

Shifu banking trojan is officially spreading to the UK

Virus

 

Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel

Hacking

 

Shocking, Teen hacker Cracka owned head of US intelligence James Clapper

Hacking

 

Shockwave player flaw exposes 450 million users at risk of hack

Hacking

 

Shodan implements a feature to browse vulnerable webcams

Vulnerebility

 

Shoring up Tor

Security

 

Should the removal of personal info posted online be a human right?

 
 

Schneider Patches Plaintext Credentials Bug in Building Automation System

 
 

School monitoring software's hard-coded encryption key exposed

 
 

Siemens Patches DoS Flaws in Industrial Products 

 
 

Signal for Android finally out, offers end-to-end encrypted calls and messages

 
 

Signal secure messaging app now available on the desktop

 
 

Silent Circle launches Blackphone 2, delivering business and personal privacy

 
 

Silent Circle promptly patched a critical flaw in the Blackphone I

Mobil

 

Silverlight exploit discovered by analyzing Hacking Team leaked emails

Vulnerebility

 

SilverPush technology tracks user habits with near-ultrasonic sounds

Technologies

 

SIM swap fraud cases force bank to improve security

Mobil

 

Simple Yet Effective eBay Bug Allows Hackers to Steal Passwords

Hacking

 

Simply Secure offers free usability design help to developers of privacy, security tools

 

30.8.2015

Six U.K. Teens Arrested for using Lizard Squad's DDoS Tool

 
 

Skype – IP will now be hidden by default to avoid attacks

Computer attack

 

SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1

 
 

Smartwatches: A new and open frontier for attack

 
 

Sniffing and tracking wearable tech and smartphones

 
 

Snoopers’ Charter will cause extreme rise in business costs

 
 

Snooping Samsung S6 calls with bogus base stations

Security

 

Social Engineering — Free Online Training for Hackers

Security

 

Social experiment: 200 USB flash drives left in public locations

 
 

Social media security is still a low priority

 
 

Social Networks – A Bonanza for Cybercriminals

Social site

 

Sofacy APT hits high profile targets with updated toolset

Hacking

 

Software Download Mirror Distributes Mac Malware 

 
 

Solving the cybersecurity challenges of smart cities

 
 

Somebody Offered Money to Raspberry Pi Foundation for Pre-Installing Malware

Virus

 

Someone could break the Bitcoin Network on demand

Security

 

Someone has pwned the Dridex botnet serving the Avira Antivirus

Virus

 

Someone Hijacks Botnet Network & Replaces Malware with an Antivirus

Virus

 

Someone Just Leaked Hard-Coded Password Backdoor for Fortinet Firewalls

Security

 

Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec

Computer attack

 

Someone wants infect millions of Raspberry Pi computers

Virus

 

Sophisticated, successful Morpho APT group is after corporate data

 
 

Sound-Proof: Two-factor authentication without user interaction

 
 

Source code of the Android GM Bot malware was leaked online

Android

 

South Korean Child Monitoring App Beset by Vulnerabilities, Privacy Issues

 
 

Spam and phishing in Q1 2017

 
 

Spam and phishing in Q3 2015

Security

 

Spam Campaign Continuing to Serve Up Malicious .js Files

 
 

SQL injection has surfaced as the no. 1 attack in 2015

 
 

SSH backdoor discovered in Fortinet FortiOS firewalls

Vulnerebility

 

Stagefright Bug 2.0 — One Billion Android SmartPhones Vulnerable to Hacking

Android

 

Stagefright Patch Incomplete Leaving Android Devices Still Exposed

 
 

Stagnant budgets and rising insider security threats

 
 

Stanford researchers identify potential security hole in genomic data-sharing network

 
 

Starwood Hotel Chain Hit By Point of Sale Malware

 
 

State-sponsored cyberattacks linked to Russian intelligence gathering

 
 

Static encryption keys affect SAP security

 
 

Stealing to the sound of music

Security

 

Stealthy GlassRAT Spies on Commercial Targets

 
 

Stepping out of the dark: Hashcat went OpenSource

Security

 

Stolen Ashley Madison data dumped online, seems legitimate

 
 

Stolen card data of 100,000 Britons for sale on the clear web

Crime

 

Stolen medical information affects 18 out of 20 industries

 
 

Stolen or lost devices and the risks of remote working

 
 

Stop DDoS attacks in seconds

Security

 

Strong passwords don’t matter if employees don’t secure them

 
 

Study: Global cost of cyber crime

 
 

Subgraph OS — Secure Linux Operating System for Non-Technical Users

OS

 

Surge in global cloud application adoption

 
 

Survey: Mobile Security - Confidence ebbs as BYOD booms

 
 

Surviving in an IoT-enabled world

Technologies

 

Surviving in the IoT world: Risks of smart home devices

 
 

Suspicious Windows 7 Update Actually an Accidental Microsoft ‘Test’ Update

 
 

Swedish Court — 'We Can't Ban The Pirate Bay'

Security

 

Swift adoption of cloud and mobile drives insider threats

 
 

Symantec fires employees who issued rogue Google certificates

 
 

T9000 backdoor, a sophisticated malware that spies on Skype users

Virus

 

Tails 2.0 is out to protect your privacy and anonymity

OS

 

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

Vulnerebility

 

Takedown of criminal gang behind ATM malware attacks

 
 

Taking root

Android

 

TalkTalk breach: Attackers demand £80,000 for stolen data

 
 

TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners

 
 

TalkTalk data breach, hackers compromised 4 million customer records

Hacking

 

TalkTalk Hack: Police Arrest Second Teenager in London

Hacking

 

TalkTalk hack: Teenager arrested in Northern Ireland

 
 

Target Says SEC Won’t Pursue Enforcement Action as a Result of Data Breach

 
 

Targeted attacks on 4Chan and 8Chan exploited bot code in Imgur

Computer attack

 

Teenage Lizard Squad hacker found guilty of 50,700 charges

 
 

Tech support scammers start targeting users of Apple devices

 
 

Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices (based on War-Driving) 

Hacking

9.9.2015

Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices (based on War-Driving) 

Hacking

 

Technical Support Scammers targets Apple users

Apple

 

Tech-savvy users are actually the worst offenders

 
 

Telegram — Secret Messaging app — Shuts Down 78 ISIS Channels

ISIS

 

Telegram Android app is a stalker's dream

 
 

Telegram messaging service tries to ban ISIS, but..

ISIS

 

Tens of thousands of DVRs exposed on Internet with Hardcoded Passwords

Security

 

Terror alert spam detected by Symantec in the wild

REPORTS

 

Test your defensive and offensive skills in the eCSI Hacker Playground

 
 

TGIF(P) – Thank god it’s fried phish

Phishing

 

The amazing adventures of personal data in European Union court

Security

 

The Android Bankosy malware steals banking OTPs

Android

 

The Angler Exploit Kit Exposed: Making $60 Million Annually by Delivering Ransomware

Virus

 

The Apple Gatekeeper bypassed once again by a researcher

Apple

 

The automation and industrialization of cyber attacks

 
 

The average budget required to recover from a security breach

 
 

The average cost of cybercrime escalates to $15 million per organization

 
 

The average organization experiences 9 insider threats each month

 
 

The barriers to cybersecurity research, and how to remove them

 
 

The BlackEnergy malware was a key element of the Ukraine power outage

Virus

 

The Bondnet botnet- From China with Love

 
 

The cyber labor market in Israel, the cyber guild

Cyber Attack

 

The danger of terror attacks using drones, and possible countermeasures

 
 

The Dark web – Why the hidden part of the web is even more dangerous?

Security

 

The DoD funded the Carnegie Mellon University’s research on Tor Hacking

Hacking

 

The Dow Jones firm confirmed data breach of 3,500 Users

Hacking

 

The Dridex Banking Malware is risen, British attention

Virus

 

The Duqu 2.0 persistence module

Virus

 

The Evolution of Acecard

Mobil

 

The evolution of ransomware: From PC Cyborg to a service for sale

Virus

 

The FBI requests $38 Million to counter the threat of Going Dark

Security

 

The FBI used the NIT to de-anonymize thousand Pedos on Tor

Security

 

The Fortinet SSH backdoor found in many other products

Hardware

 

The French Gov wants to Block Tor and Forbid Free Wi-Fi

Vulnerebility

 

The French Gov will not block Tor neither Free Wi-Fi

Security

 

The future of information security in the government

 
 

The GasPot experiment: Hackers target gas tanks

 
 

The German intelligence agency BND resumed surveillance activities with the NSA support

NSA

 

The German Intelligence Systematically Spied on Allies

Security

 

The Hacking crew known as Gaza cybergang was very active in Q2 2015

Hacking

 

The Hello Barbie doll, lights and shadows

Hacking

 

The changing role of the risk manager

 
 

The impact of data breaches on customer loyalty

 
 

The impact of digital business on information security

 
 

The Infernal-Twin tool, easy hacking wireless networks

Hacking

 

The IPT ruled that GCHQ spies can legally hack any electronic devices

Hacking

 

The ISIL is trying to hack American electrical power companies

ISIS

 

The ISIS guide, how to stay secure online

ISIS

 

The ISIS has the ability to make fake Syrian passports

ISIS

 

The Jailbreaking procedure is now legal in the United States

Apple

 

The leading cause of insider threats? Employee negligence

 
 

The look and feel of Infosecurity Europe 2015

 
 

The most damaging ramifications of DDoS attacks

 
 

The Mysterious Case of CVE-2016-0034: the hunt for a Microsoft Silverlight 0-day

Vulnerebility

 

The mystery behind the Internet-of-Things vigilante malware

Virus

 

The new FighterPOS PoS Malware implements worm capabilities

Virus

 

The new iPhone designed by Apple will be unhackable

Apple

 

The new Nmap 7 version just released

Software

 

The North American cyber-criminal underground it’s easy to access!

Cyber Attack

 

The number of fingerprints stolen in OPM hack rose to 5.6 million

 
 

The number of Governments using the FinFisher Spyware is increased

Virus

 

The official website of the popular vBulletin forum has been hacked

Hacking

 

The OSX.Dok dropper spotted installing the new Bella backdoor

 
 

The privacy risks of school technology tools

 
 

The Rakos botnet – Exploring a P2P Transient Botnet From Discovery to Enumeration

 
 

The Ramnit Botnet is back after the law enforcement takedown

Security

 

The rapid growth of the bug bounty economy

 
 

The Rapid Increase in the Sophistication of Exploit Kits

Security

 

The return of HackingTeam with new implants for OS X

Apple

 

The rise of .NET and Powershell malware

Virus

 

The rise of artificial intelligence technologies

Technologies

 

The rise of mobile transactions and online lending fraud

 
 

The rise of repeated "low and slow" DDoS attacks

 
 

The rise of the Japanese Cybercrime Underground

Crime

 

The security community's reaction as CISA passes US Senate

 
 

The senior advisor behind Silk Road has been arrested

Hacking

 

The Shade Encryptor: a Double Threat

Virus

 

The Shopify commerce platform is open to RFD attacks

Computer attack

 

The Signal app is available in beta version

Android

 

The Smurf Suite – GCHQ can hack your phone with a text message

Security

 

The Snake APT Group is preparing its offensive against high-profile Mac users

 
 

The Sony PlayStation Network is down worldwide

Hacking

 

The state of the mobile ecosystem

 
 

The Supply chain of the HandBrake Mac software compromised to spread Proton malware

 
 

The surveillance firm Hacking Team is back stronger than before

Security

 

The top 7 improvements in Nmap 7

 
 

The Tor Project announces bug bounty program

 
 

The Tor Project Is launching the Tor Bug Bounty Program

Security

 

The Trojan Games: Odlanor malware cheats at poker

Virus

 

The unstoppable rise of DDoS attacks

 
 

The US DoD still uses SHA-1 signed certificates for use by military agencies

Security

25.9.2015

The US military is still sending un-encrypted emails

Kryptografie

 

The value in vulnerability management platforms

 
 

The value of threat intelligence

 
 

The Website of the Norwich airport hacked, a cue to reflect

Hacking

 

The World's First $9 Computer is Shipping Today!

Technologies

 

The worst data disasters from 2015

 
 

Theoretical computer science provides answers to data privacy problem

 
 

These Top 10 Programming Languages Have Most Vulnerable Apps on the Internet

Vulnerebility

 

These Top 30 Ashley Madison Passwords are just as Terrible as You'd Think 

Hacking

13.9.2015

These Top 30 Ashley Madison Passwords are just as Terrible as You'd Think 

Hacking

 

These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I

Cyber Attack

 

These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II 

Cyber Attack

8.9.2015

These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II 

Cyber Attack

 

They Named it — Einstein, But $6 Billion Firewall Fails to Detect 94% of Latest Threats

Security

 

Think twice about Android root

 
 

Third suspect arrested in connection with the TalkTalk breach

Security

 

This Android Malware Can Root Your Device And Erase Everything

Android

 

This Computer Chip Self-Destructs in 10 Seconds (On Command) to keep Secrets Safe

Hardware

 

This Creepy App Captures Users' Private Moment Photos and Blackmails for Money 

App

8.9.2015

This Creepy App Captures Users' Private Moment Photos and Blackmails for Money 

App

 

This is How Tokyo Police Catching Rogue Drones in the Sky

Security

 

This Malware Can Delete and Replace Your Entire Chrome Browser with a lookalike

Virus

 

This Malware Can Secretly Auto-Install any Android App to Your Phone

Android

 

This 'Radio Wave' Hack allows Hackers to Control Your Phone From 16 Feet Away

Hacking

 

This Secure Operating System Can Protect You Even if You Get Hacked

Security

 

Thousands of Devices Hacked by Rakos Botnet 

 
 

Thousands of Hacked WordPress Sites Abused to Infect Millions of Visitors

Crime

 

Thousands of Magento websites compromised to serve malware

Virus

 

Thousands of WordPress websites used as a platform to launch DDOS

Hacking

 

Thousands of Zhone SOHO routers can be easily hijacked

 
 

Thousands stolen identities of Britons available on the Darkweb

Hacking

 

Threat actors hacked the popular Touchnote company

Hacking

 

Threat actors leverage the KONNI Malware to target organizations linked to North Korea

 
 

Threat and vulnerability management market revenue to reach $5.3 billion 

 
 

Threat intelligence: Sources, sharing, utilization and the government

 
 

Three indicted in largest theft of customer data from a U.S. financial institution in history

 
 

Three men charged for the attack on the JPMorgan Chase

Hacking

 

Three simple ways to prevent a data breach

 
 

Thunderstrike 2 OS X Firmware Attack Self-Replicates to Peripherals

 
 

Time to update your Veeam to fix a VeeamVixProxy Vulnerability

Vulnerebility

 

Time Warner Cable security breach may have exposed 320K customers

Hacking

9.10.2015

Tips and Tricks to Hide from Big Brother’s Watchful Eye

BigBrothers

 

Tips for implementing a converged infrastructure 

 
 

Tips for managing and securing SSH keys

 
 

Tis the season for shipping and phishing

Security

 

TLS Implementations Vulnerable to RSA Key Leaks

 
 

T-Mobile customer data stolen from Experian already for sale

 
 

To pay or not to pay – the dilemma of ransomware victims

Virus

 

Today NSA has Stopped its Bulk Phone Surveillance Program

NSA

 

Too many vulnerable medical systems can be found online

 
 

Top 10 — 2016 New Year's Resolutions for Cyber Security Professionals

Security

 

Top 10 technology challenges for IT audit professionals

 
 

Top 10 U.S. cities for online fraud

 
 

Top 8 Cyber Security Tips for Christmas Online Shopping

Cyber Attack

 

Top cloud security issue? Lack of visibility

 
 

Top IoT concerns? Data volumes and network stress

 
 

Top Obama Officials to Testify on Russian Election Interference 

 
 

Top obstacles to EMV readiness

 
 

Top strategic IT predictions for 2016 and beyond

 
 

Top tips on safe online banking from the comfort of your home

Security

 

Tor Project claims FBI paid university researchers $1m to unmask Tor users

 
 

Tor Project to Start Bug Bounty Program — Get Paid for HACKING!

Security

 

Tor Releases Anonymous Instant Messenger. Here's How to Use It

Security

 

Tor security improves as .onion becomes a special-use domain name

 
 

Tor: FBI Paid CMU $1 Million to De-Anonymize Users

 
 

TorMail hack, FBI surgical operation, or dragnet surveillance?

Security

 

Torrent websites infected 12 million Internet users per month

Virus

 

Total cost of average data breach reaches $3.8 million

 
 

Toymaker VTech Hack Exposes 4.8 Million Customers, including Photos of Children

Crime

 

Tracking Hacker Forums with Traffic Analysis

Computer attack

 

Travel smart: Tips for staying secure on the road

 
 

Travel Tech Giant Sabre Investigating Data Breach 

 
 

Travel Tech Giant Sabre suffered a Data Breach, traveler data potentially at risk

 
 

Trends that will alter the way IT is consumed in 2016

 
 

TrickBot is a rising threat, the banking Trojan now targets Private Banking

 
 

TrickerBot Trojan Targets Private Banking 

 
 

Trident nuclear weapons system could be vulnerable to cyber attacks

Vulnerebility

 

Trojanized adware: already infected more than 20,000 Android Apps

Virus

 

Trojanized versions of 20,000 popular apps found secretly rooting Android devices

 
 

TrueCrypt Encryption Software Has Two Critical Flaws: It's time to Move On

Vulnerebility

 

TrueCrypt is safer than previous examinations suggest

Open source

 

Trump Fires FBI Director James Comey 

 
 

Trump Fires FBI Director Over Clinton Probe, Amid Russia Investigation

 
 

Turing Award — Inventors of Modern Cryptography Win $1 Million Cash Prize

Security

 

Turkey banned Wikipedia because its content web contents that represents a threat to national security

 
 

Turkish hackers took over a Russian Govt Instagram account

Hacking

 

Turkish officers are in contact with members of the ISIS

ISIS

 

Turkish systems under attack. Is it information warfare?

Cyber Attack

 

Turla APT Group Abusing Satellite Internet Links

APT

 

Turla Cyberspies Developing Mac OS X Malware 

 
 

Turris Omnia Security Project protects home network users

Technologies

 

Twitter Open Sources 'Diffy' that Automatically Catches Potential Bugs in Code

Social site

 

Twitter users warned about being targeted by state-sponsored attacks

 
 

Twitter warns victims of state-sponsored attacks

Social site

 

Twittor tool uses Twitter direct messages to control botnets

Security

 

Two thirds of the Android devices are vulnerable to Lockdroid ransomware

Android

 

Two Years to General Data Protection Regulation Compliance

Security

 

U.S. Alerted France to Russia Hack Targeting Macron: NSA 

 
 

U.S. charges a suspect with cyber terrorism for the first time

Cyber Attack

 

UDP-based Portmap latest target for DDoS attackers looking to amplify attacks

 
 

uh-oh! North America Runs Completely Out of IPv4 Internet Addresses

Technologies

 

UK ANPR systems are one of the ‘world’s biggest surveillance systems’

Vulnerebility

 

UK businesses ‘number one target for cybercriminals’

Hacking

 

UK dating fraud victims lost £33,5 million last year

 
 

UK Gov could hack children’s smart toys to Spy on suspects

Hacking

 

UK Government’s secret programme for mass surveillance on internet and phones leaked

 
 

UK High Court declares emergency surveillance bill unlawful

 
 

UK job recruiters network hit by hacker, user info dumped online

 
 

UK workers are significantly lacking in security awareness

 
 

UK, US law enforcement agencies disrupt Dridex botnet

 
 

UK’s NCA calls for global approach to cybercrime

Crime

 

Unauthorized code found in Juniper’s firewall OS

Cyber Attack

 

United Airlines hacked by same group that breached Anthem and OPM

 
 

United Nations Rules in Favor of WikiLeaks Founder Julian Assange

News

 

Unity Game Engine Forum Hacked

 
 

University implies they helped FBI break Tor protection because of a subpoena

 
 

Unpatched Drupal flaws open websites to attacks

Computer attack

 

Unpatched OS X, iOS flaws allow password, token theft from keychain, apps

 
 

Unpatched Wordpress Flaw Could Allow Hackers To Reset Admin Password

 
 

Unpatched WordPress Password Reset Flaw Disclosed 

 
 

Unsafe password policies leave shoppers vulnerable

 
 

Unsupported Honeywell Experion PKS Vulnerable to Public Attacks 

 
 

Unsurprisingly, companies are not protecting personal information

 
 

Unsurprisingly, most would support eliminating passwords

 
 

Untethered Jailbreak for iOS 9.0, 9.0.1 and 9.0.2 Released

Apple

 

Unusual Re-Do of US Wassenaar Rules Applauded

 
 

Upcoming trends in the SIEM market

 
 

Updated Cryptowall Encrypts File Names, Mocks Victims

 
 

Updated DGA Changer Malware Generates Fake Domain Stream

 
 

Updated Rig Exploit Kit Closing in on 1 Million Victims

 
 

Updated XcodeGhost Adds iOS9 Support

 
 

UPnP Trouble Puts Devices Behind Firewall at Risk

Computer attack

 

Uptick in Neutrino Exploit Kit Traffic Doesn’t Mean Angler Reign Over

 
 

US Air Force Wireless hacking in Flight

Security

 

US and UE, a joint effort against the Dridex Botnet

Security

 

US Army Experts Call for military bug bounty program AVRP

Vulnerebility

 

US DoD invites a restricted number of hackers to Hack the Pentagon

Hacking

 

US DOJ admits that Stingrays can be used to intercept call and SMS content

 
 

US Eavesdropping on Netanyahu Communications

Security

 

US Energy Department's systems breached 159 times in four years

 
 

US Intelligence confirms the ISIS used chemical weapons

ISIS

 

US Intelligence Chief Hacked by the Teen Who Hacked CIA Director

NSA

 

US Judge requests Apple to unlock San Bernardino shooter’s iPhone

Apple

 

US Library of Congress makes tinkering with your car software legal

 
 

US NSA Spy Agency Halts Controversial Email Sweep 

 
 

US OPM takes vulnerable background investigation portal offline 

 
 

US OPM takes vulnerable background investigation portal offline 

 
 

US Ports – Cyber attacks can cause the release of dangerous chemicals

Cyber Attack

 

US starts cyber operations against the ISIL in Mosul

ISIS

 

US state police cars are vulnerable to cyberattack

Cyber Attack

 

US will revise Wassenaar pact changes

 
 

US, UK spies reverse-engineered security software in search for flaws

 
 

USB Killer 2.0 – How to easily burn a PC with a USB device

Security

 

USB Killer 2.0: A harmless-looking USB stick that destroys computers

 
 

Use of acid and lasers to access data stored on iPhones

Apple

 

Users find backdoors to do their job

 
 

Users force LinkedIn to bring back connections download tool used by scrapers

 
 

Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks

Computer attack

 

Using SimpliSafe Home Security? — You're Screwed! It's Easy to Hack & Can't be Patched

Security

 

Using the Microsoft EMET security tool to hack itself

Security

 

Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center

NSA

 

Valasek: Today’s Furby Bug is Tomorrow’s SCADA Vulnerability 

Vulnerebility

10.9.2015

Valasek: Today’s Furby Bug is Tomorrow’s SCADA Vulnerability 

Vulnerebility

 

Valve Patches Password Reset Vulnerability in Steam

 
 

Variety Jones, A Senior Adviser to ‪Silk Road‬ arrested in Thailand

Hacking

 

vBulletin security patches and zero-day exploit available online

Vulnerebility

 

vBulletin, Foxit forums hacked, attacker exploited a zero-day flaw?

 
 

Vegan and BeEF clash shows how cyber arms race never stops

 
 

VeraCrypt Patched Against Two Critical TrueCrypt Flaws

 
 

Verizon and Splunk deliver actionable threat intelligence

 
 

Victims of June OPM Hack Still Haven’t Been Notified

 
 

Victims of the Gomasom Ransomware can now decrypt their files for free

Virus

 

Video training course: Computer and hacking forensics

 
 

Video training course: Penetration testing and ethical hacking

 
 

Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case

 
 

Vigilante Hackers Aim to Hijack 200,000 Routers to Make Them More Secure

Security

 

Virus Bulletin 2015

Virus

 

Virus Bulletin small talk: Diversity in tech

REPORTS

 

Viruses, bulletins, surveys, and gender: hashtag #VB2015

Virus

 

VirusTotal Adds Sandbox Execution for OS X Apps

 
 

VirusTotal now Scans Mac OS X Apps for Malware

Android

 

Vision for a new generation of experimental cybersecurity research

 
 

Vizio Smart TVs track your viewing habits, info is sold to third parties

 
 

VMware Patches Pesky XXE Bug in Flex BlazeDS

 
 

Voice as a threat: VoLTE, a new tool to compromise mobile networks

Security

 

VPN protocol flaw allows attackers to discover users' true IP address

 
 

VPN users be aware , Port Fail flaw can reveal your identity

Security

 

VTech data breach gets worse: Children's pictures and chat logs were also compromised

 
 

Vtech hacked, data of thousands of kids exposed

Hacking

 

Vulnerabilities Identified in Dolphin, Mercury Android Browsers

 
 

Vulnerabilities in 2015: 0-days, Android vs iOS, OpenSSL

 
 

Vulnerabilities in security software leave users open to attacks

 
 

Vulnerability Allowed Hackers to Steal iCloud Keychain Secrets 

 
 

Vulnerability and configuration management for Amazon Web Services

 
 

Vulnerability Identified in Genomic Data Sharing Network 

 
 

Vulnerability management embraces new functions

 
 

Vulnerable gambling apps put corporate data at risk

 
 

Vulnerable medical equipment details disclosed online

Vulnerebility

 

Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries

 
 

VXE Flaw allowed threats to bypass FireEye detection engine

Vulnerebility

 

Výzkumníci Manipulovat pušky Precision Cílení System

 
 

w00t! Google OnHub Router actually Runs on Chrome OS; Here's How to Root it

Security

 

W3C to make payments easier and more secure

 
 

Waiting for a court ruling, a New York Judge rejected FBI request to unlock an iPhone

Apple

 

Wanna Mine Bitcoins Faster? Researchers Find New Way to Do it

Technologies

 

Want WhatsApp Free Video Calling? This Leaked Screenshot Reveals Upcoming Feature

Security

 

Wargame teaches senior leaders about strategic threats and risks

 
 

Warning — People are Sharing a Link that will Crash and Reboot your iPhone

Apple

 

Warning — Popular 'Hot Patching' Technique Puts iOS Users At Risk

Apple

 

Warning — Setting This Date On iPhone Or iPad Will Kill Your Device Permanently

Apple

 

Warning! — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System

Hacking

 

Warning! Don't Click that Google Docs Link You Just Received in Your Email

 

28.8.2015

Warning! How Hackers Could Hijack Your Facebook Fan Page With This Trick

 
 

Warning! Popular Apple Store Apps Infected with Data-Theft Malware

Virus

 

Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers 

Vulnerebility

8.9.2015

Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers 

Vulnerebility

 

Warning: 18,000 Android Apps Contains Code that Spy on Your Text Messages

Android

 

Washington state sues iYogi tech support firm for scamming users

 
 

WD self-encrypting hard drives

 
 

Wealth of personal data found on used electronics purchased online

 

1.9.2015

Weaponized Drones For Police Now Legal In North Dakota

 
 

Web Hosting Service 000webhost Hacked, Information of 13 Million Leaked 

 
 

Web.com Loses 93,000 Credit Card Numbers in Breach

 
 

Website of Popular Mac Software Hacked to Spread Malware

 
 

Week in review: Android ransomware multiplies, FireEye censors researcher

 
 

Week in review: Apple tackles XcodeGhost malware, AVG will sell user data, iOS 9 exploit is worth $1 million

 
 

Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure 

 
 

Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure WD self-encrypting hard drives

 
 

Week in review: DDoS attack on ProtonMail, 0-days found in Samsung Galaxy S6 Edge

 
 

Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions

 
 

Week in review: Drone detection, crypto wars, and tracking wearable tech

 
 

Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware

 
 

Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine

 
 

Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015

 
 

Week in review: Information the FBI can collect with NSLs revealed, VPN protocol flaw gives away users' true IP address

 
 

Week in review: iOS malware compromising Apple accounts, and fake recruiters on LinkedIn targeting infosec pros

 
 

Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL

 
 

Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management

 
 

Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016

 
 

Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of

 
 

Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine

 
 

Week in review: New C++ bugs, preventing insider threats, and gamifying threat detection

 
 

Week in review: New OS X threats, and how to protect your privacy on Windows 10

 
 

Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine

 
 

Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe

 
 

Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach

 
 

Week in review: SLOTH attacks, JavaScript-based ransomware, and hacking medical implants

 
 

Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0

 
 

Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure 

 
 

Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones

 
 

Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service

 
 

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, 

 
 

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed

 
 

Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays

 
 

Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things

 
 

Week in review: Windows 10 security features, and thwarting user profiling based on typing behavior

 
 

Well-informed tech support scammers target Dell users

 
 

Western Digital self-encrypting hard drives are completely insecure

 
 

Western Digital self-encrypting hard drives are not secure

Hacking

 

What Can be Expected in Trump's Cybersecurity Executive Order? 

 
 

What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware

 
 

What drives employees to shadow IT?

 
 

What is a secure OS?

Security

 

What is Threat Intelligence and How It Helps to Identify Security Threats

Security

 

What You Should Know about Triangulation Fraud and eBay

Security

 

What's burning up resources for IT pros during the summer?

 
 

WhatsApp Blocks Links to Telegram Messenger (Its biggest Competitor)

Security

 

WhatsApp collects phone numbers, call duration, and a lot of metadata

Security

 

WhatsApp collects phone numbers, call duration, and more!

 
 

WhatsApp to Share your Personal Data With Facebook

Social site

 

When a 'Hacker News' Reader Tricked Me into visiting this Amazing Site (Don't Click at Work)

Security

 

When hacking saves lives: Hacking medical devices and implants

 
 

When it comes to breaches, time is the biggest challenge

 
 

When working is more than just business

News

 

WHID Injector: How to Bring HID Attacks to the Next Level

 
 

Which Android smartphones are most secure?

 
 

Which are most used passwords in opportunistic criminal attacks?

Hacking

 

Which are principal cybercriminal ecosystems in the Deep Web?

Crime

 

White House Says No Thanks to Snowden Pardon Petition

 
 

White House Support for CISA Worries Privacy Advocates

 
 

Whitepaper - Breach Response: How to Prepare for the Inevitable

 
 

Whitepaper: 10 key questions to ask when selecting a cloud service

 
 

Whitepaper: 10 things your next firewall must do

 
 

Whitepaper: 5 ways to take a collaborative approach to IT security

 
 

Whitepaper: Anatomy of a Healthcare Data Breach

 
 

Whitepaper: Cyber Security Best Practices

 
 

Whitepaper: Using micro-segmentation to make cybersecurity work

 
 

Who fixes the most vulnerabilities?

 
 

Who Hacked French President-elect Emmanuel Macron's Campaign? 

 
 

Who is behind the hack of Uber’s driver database?

Hacking

 

Who is the unknown buyer that bought Adblock Extension

Technologies

 

Who planted the backdoors in Juniper's firewalls?

 
 

Who planted the Juniper ScreenOS Authentication Backdoor?

NSA

 

Why background screening is vital for IT security

 
 

Why enterprise security priorities don't address the most serious threats

 
 

Why improving cyber resilience is key

 
 

Why parents must teach their children about internet security

Security

 

Why PS4 is not so secure for the ISIS members’ communication?

ISIS

 

Why Ransomware Will Continue to Rise in 2015

Virus

 

Wi-Fi HaLow to extend Wi-Fi solutions for the Internet of Things

 
 

WiFi jamming attacks more simple and cheaper than ever

 
 

WiFi jamming, too easy and cheap to run attacks

Security

 

Wikileaks – NSA tapped world leaders for US geopolitical Interests

NSA

 

WikiLeaks Details MitM Attack Tool Used by CIA 

 
 

Wikileak's Julian Assange Could Be Set Free On Friday by United Nation

News

 

WikiLeaks leaked documents that detail the Archimedes tool used by the CIA in MitM attacks

 
 

WikiLeaks obtains CIA Director's Hacked Emails and Plans to Publish them Shortly

Security

 

WikiLeaks publishes documents stolen from CIA director's email account

 
 

WikiLeaks publishes reports showing NSA spied on French presidents

 
 

Wikileaks releases CIA Director John Brennan emails

Security

 

Wikileaks Unveils CIA's Man-in-the-Middle Attack Tool

 
 

Will 2016 be the year of the 100G network?

 
 

Will 2016 mark the end of the Advanced Persistent Threat?

 
 

Will the 2016 US presidential campaign get hacked?

 
 

WIN $1 Million Bounty For Hacking the New iOS 9 iPhone

Apple

 

Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings

Security

 

Windows 10 Started Showing Ads on LockScreen — Here's How to Turn It OFF

Security

 

Windows 10 Upgrade Become More Creepy, No Option to Opt-Out

Windows

 

Windows 10 Upgrade Spam Carries CTB-Locker Ransomware

 
 

Windows Bitlocker disk encryption could be easily bypassed

Security

 

Windows Live ID scam targets personal information

 
 

Windows machines stop trusting Dell's two unconstrained root CA certs

 
 

Windows Phone hacked with Windows Phone Internals

Hacking

 

WinRAR zero-day open million users to hack

Vulnerebility

 

With Its First Android app, Apple tried to Kill Android Community, But Failed Badly!

Android

 

With unprotected keys and certificates, businesses lose customers

 
 

Women represent only 10% of the infosec workforce

 
 

WordPress 4.2.4 fixes critical vulnerabilities

 
 

WordPress Attacks Powered by Router Botnet Drop Rapidly 

 
 

WordPress Patches Critical XSS Vulnerability in All Builds

 
 

WordPress Patches Serious Shortcodes Core Engine Vulnerability

 
 

WordPress Security: Brute Force Amplification Attack Targeting Thousand of Blogs

Computer attack

 

World's 9 Biggest Banks to adopt Bitcoin's Blockchain Technology

Technologies

 

Worldwide IT spending to decline 5.5 percent in 2015

 
 

Would Encryption Backdoor Stop Paris-like Terror Attacks?

Virus

 

WP Engine breached, forces users to change their passwords

 
 

Writing Advanced OS X Malware an ‘Elegant’ Solution to Improving Detection

 
 

xboxlive digital certificate exposed opens users to MITM attacks

Computer attack

 

XCodeGhost Attack – Is Apple’s Biggest Hack Ever linked to the US Intelligence?

Computer attack

 

XcodeGhost iOS Malware Contained

 
 

Xen Patches VM Escape Flaw

Vulnerebility

 

Xen Project plugs critical host hijacking flaw, patch ASAP

 
 

XOR DDoS botnet launching attacks from compromised Linux machines

 
 

XSS, SQLi bugs found in several Network Management Systems

Vulnerebility

 

Yahoo awarded $7,000 a bug hunter for Flickr account hijacking vulnerability

 
 

Yahoo Awards $7,000 for Flickr Account Hijacking Flaws 

 
 

Yahoo Hires Bob Lord as its CISO

 

Yahoo open-sources Gryffin, a large scale web security scanning platform

 

Yahoo Paid Out $2 Million in Bug Bounty Program 

Security

 

Yahoo to Warn Users of State-Sponsored Attacks

BigBrother

 

Yahoo touts Úspìch Bug Bounty Programu

Security

 

Yahoo! Launches Free Web Application Security Scanner

Open source

5.10.2015

YiSpecter — First iOS Malware that Attacks both: Non-jailbroken and Jailbroken Devices

iOS

 

YiSpecter iOS Malware Abuses Apple Enterprise Certs to Push Adware

iOS

 

YiSpecter iOS Malware can infect any Apple iOS device

Apple

 

You can buy a Cryptolocker/Cryptowall Ransomware Kit for $3,000

Virus

 

You can Hack into a Linux Computer just by pressing 'Backspace' 28 times

Hacking

 

You Can Hack Your Own Car — It's Legal Now

Security

 

You can’t be invulnerable, but you can be well protected

Vulnerebility

 

You need just $8,000 to exploit a zero-day in a critical infrastructure

Hacking

 

You’re Paying for Your Starbucks, One Way or the Other

Crime

 

Your GPS Location and Calls Can be Spied Using Network Vulnerability

Vulnerebility

 

Zero Day in Android’s Google Admin App Can Bypass Sandbox

Vulnerebility

 

Zero knowledge proof as an enabler for Cyber weapon information sharing

Cyber Attack

 

Zero Trust approach to network security

Security

 

Zero-day disclosure-to-weaponization period cut in half 

Vulnerebility

 

Zero-day disclosure-to-weaponization period cut in half 

Vulnerebility

 

ZeroDB, the end-to-end encrypted database, goes open source

Security

 

Zerodium Hosts Million-Dollar iOS 9 Bug Bounty

Apple

 

Zerodium offers $100,000 for bypass Flash Player heap isolation

Security

 

Zerodium Offers $100,000 for Flash Zero-Day Exploit that Bypasses Mitigations

Security

 

Zerodium price list for secret Hacking methods

Security