Qihoo 360: Just the Tip of the Whitelisted Malware Iceberg
The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be to get apps from places other than the Apple App Store and Google Play EvenRead More →
The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be to get apps from places other than the Apple App Store and Google Play EvenRead More →
The Open Sourced Vulnerability Database (OSVDB) shut down permanently in response to the lack of assistance from the industry. The Open Sourced Vulnerability Database (OSVDB) shut down permanently, the news wasRead More →
Crypto-ransomware has turned every network intrusion into a potential payday. There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range of organizations over theRead More →
A new ransomware called CryptoHost was discovered by security researcher Jack that states that it encrypts your data and then demands a ransom of .33 bitcoins or approximately 140 USD to get your files back.Read More →
Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135 million device open to attacks. The security expert David LongeneckerRead More →
Proofpoint researchers discovered that the Magnitude exploit kit (EK) [1] was successfully exploiting Adobe Flash version 20.0.0.306. Because the Magnitude EK in question did not direct any exploits to FlashRead More →
Short Bytes: Sarah Jamie Lewis is an independent security researcher who has devised a tool called OnionScan to locate the loopholes in dark web sites. This will allow system admins toRead More →
Anonymous Philippines hacked the COMELEC database, the incident exposed records of more than 55 million voters, it is the biggest gov-related data breach. A few days ago I reported theRead More →
XOR botnet authors migrate to using BillGates malware. Over the past six months, security researchers from Akamai’s SIRT team have observed a shift in the cyber-criminal underground to using botnets createdRead More →
Listeners hear explicit audio caused when station equipment is commandeered. Some Tuesday morning listeners of KIFT, a Top 40 radio station located in Breckenridge, Colorado, were treated to a radically differentRead More →
Facebook’s CAPTCHA system too, over 70% accuracy achieved. A trio of security researchers have devised a new automated attack that can break the CAPTCHA systems employed by Google and Facebook. TheRead More →
A threat actor named TA530 group, has been targeting executives in an attempt to infect their machine with various malware, including ransomware. Ransomware continues to represent one of the greatestRead More →
Eight out of twelve apps vulnerable to new attack. This past Monday, at the GI Sicherheit 2016 security conference in Bonn, Germany, two researchers unveiled details about a new type ofRead More →
This is kind of a big deal because the mess is in 14.04 LTS, expiry date 2019. Ubuntu has patched four Linux kernel vulnerabilities that allowed for arbitrary code execution andRead More →
A new Flash Player zero-day vulnerability (CVE-2016-1019) has been actively exploited by threat actors in attacks against systems running Windows XP and 7. Once again a zero-day vulnerability in the AdobeRead More →
iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhoneRead More →
Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known vulnerabilities and will scan your machine or networkRead More →
Security experts warn companies need to brace for new harder-to-detect and more determined variants of the Locky ransomware spotted recently in the wild. The news comes just as reported LockyRead More →
WhatsApp now uses Signal protocol, which was largely funded by US taxpayers. WhatsApp has enabled end-to-end encryption across all versions of its messaging and voice calling software, according to a TuesdayRead More →
Rupture framework used to upgrade three-year-old BREACH framework and hack Facebook and Gmail 500 times faster. Security researchers have expanded and improved a three-year-old cyber-attack that could steal information from websitesRead More →