Chrome becomes a bit less of a memory hog with version 45
Some new Flash refinements will make it use less battery power, too. While the Chrome browser is extremely popular, it has gained something of a reputation. What hippos are toRead More →
Some new Flash refinements will make it use less battery power, too. While the Chrome browser is extremely popular, it has gained something of a reputation. What hippos are toRead More →
We’re used to seeing malware that exploits unpatched vulnerabilities in software. But in a new twist attackers are bundling an old version of remote access package TeamViewer with their malwareRead More →
While working on some forthcoming research on cryptographic backdoors i came across an interesting asymmetric backdoor designed to subvert RSA key generation algorithms by Ryan Castellucci. The backdoor is particularlyRead More →
Security experts constantly tell users not to reuse passwords on multiple accounts, but the message often falls on deaf ears. Now, officials at Mozilla are finding that advanced users don’t alwaysRead More →
G DATA security experts published their latest research in which they’ve analyzed top Chinese Android smartphone models and found that a large number of them ship with pre-installed malware andRead More →
Online daters risk being held to ransom in possible cyber attack on Match.com Match.com has suspended advertising on its UK site whilst investigating amalware issue that put singles looking for loveRead More →
During the course of our daily malware hunt, we came across a new mobile ransomware variant that leverages pornography to lure victims into downloading and installing it. We’d previously bloggedRead More →
Six weeks after hackers revealed vulnerabilities in a 2014 Jeep Cherokee that they could use to take over its transmission and brakes, Chrysler has pushed out its patch for thatRead More →
A new strain of Android ransomware disguised as a video player app uses a means of communication unseen in other similar malware. Most of the victims are in the UnitedRead More →
New variants of the notorious Carbanak Trojan have surfaced in Europe and the United States, and researchers say that the malware now has its own proprietary communications protocol and the samplesRead More →
The hack revealed the inner workings of the studio, as well as the personal information of more than 47,000 celebrities, freelancers, and current and former Sony employees. Sony Pictures hasRead More →
It didn’t even take a day for security researchers to find a serious way of exploiting the mechanism through which user clicks could be faked in Mac OS X. AntoineRead More →
A new variant of mobile ransomware that encrypts the content of Android smartphones is putting a new spin on both how it communicates with its masters and how it spursRead More →
Most automated scanning and security tools that ferret out cross-site scripting vulnerabilities don’t do much analysis beyond the target application. Netflix this week, however, released to open source a toolRead More →
Despite its ubiquity, Internet of Things security still isn’t ready for prime time. The security of Internet-connected baby monitors got a failing grade from researchers who found critical vulnerabilities inRead More →
Ransomware, the biggest pain that is causing many PC and laptop completely encrypted. If you don’t have money or brains, you cannot survive. It encrypts your important data, it canRead More →
The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged onRead More →
A stored XSS vulnerability was identified and reported by Bitdefender’s staff to PayPal, one that could have been easily used by hackers as an entry point for further attacks. WeRead More →