F-Secure report details “The Dukes” malware family and its Russian connections. For the past seven years, a cyberespionage group operating out of Russia—and apparently at the behest of the Russian
SharePoint, one of the tools included with Microsoft Office’s server suite, has been patched to protect users from a persistent XSS (cross-site scripting) flaw which could expose their private information.
Proof-of-concept exploit installs malicious app on nearby iPhones. Apple has mitigated a critical iOS vulnerability that allows attackers within Bluetooth range of an iPhone to install malicious apps using the
Android devices may be protected by a lock screen which requires some form of authentication before access to most phone features, its settings and the data stored on it is
In a Q&A session, CEO Mark Zuckerberg says Facebook will offer more choices than merely “like.” He also discusses virtual reality, artificial intelligence and his feelings about becoming a dad.
WordPress core engine security vulnerabilities aren’t rare, but they are uncommon. Most issues affecting the integrity of sites running on the content management system are introduced by third-party plugins and
More than a dozen routers in four countries infected with fully featured implants. Researchers have uncovered active and highly clandestine attacks that have infected more than a dozen Cisco routers
As researchers expected it would, CoreBot, the credential-stealing malware that surfaced last month, has added a bevy of new capabilities and reinvented itself as a robust banking Trojan. Researchers said
Mobile VPN and Tor router can tether to public Wi-Fi—and charge your phone. Over the past year, there has been a burst of crowd-funded efforts to provide simple, inexpensive privacy
This Sunday, Intel announced the creation of the Automotive Security Review Board (ASRB) to help automakers secure cars and drivers in the face of the rising threat of car hacking.
Halfway down the southbound four-lane highway from Cancun to the ancient ruins in Tulum, traffic inexplicably slowed to a halt. There was some sort of checkpoint ahead by the Mexican Federal
This vulnerability was discovered by Rafal Wojtczuk and Corey Kallenberg, check original white paper. Around one month ago, at 31-st Chaos Communication Congress, Rafal Wojtczuk and Corey Kallenberg presented an
A new ATM malware has hit the streets and it’s called Suceful. This new malware seems to have been created in August 2015, and it is unclear if it is still under
Answers on a postcard from Syria, please. GCHQ has declined to comment on a report in the Daily Telegraph this weekend, which claimed that UK cabinet ministers’ emails had been
Networking process crashed by crafted packets. One of the world’s major suppliers of industrial networking kit, Japanese company Yokogawa, has alerted the world to a vulnerability in 21 of its
Hackers linked to known North Korean attack points and methods exploited a zero-day vulnerability in the Hangul Word Processor (HWP), widely deployed in the offices of the South Korean government.