BrickerBot Author Claims He Bricked Two Million Devices
Just like Wifatch and Hajime, the BrickerBot malware is the work of a vigilante grey-hat, who goes online by the name of Janit0r, a nickname he chose on the HackRead More →
Just like Wifatch and Hajime, the BrickerBot malware is the work of a vigilante grey-hat, who goes online by the name of Janit0r, a nickname he chose on the HackRead More →
Cyber security experts disclosed the existence of 10 unpatched security flaws in dozens of Linksys routers widely used today. The IOActive senior security consultant Tao Sauvage and the independent securityRead More →
A Russian malware author is using codified tweets to start and stop DDoS attacks against desired targets. The DDoS attacks are launched from the computers of infected users using aRead More →
Like many in the security industry, we’ve been busy investigating the implications of the Shadow Brokers leak, with the DOUBLEPULSAR payload in particular attracting our attention. Like many in theRead More →
Code-execution flaw is triggered by plugging a booby-trapped USB into vulnerable PCs. One of the Microsoft Windows vulnerabilities used to spread the Stuxnet worm that targeted Iran remained the mostRead More →
Sensors used to detect the level of ambient light can be used to steal browser data, according to privacy expert Lukasz Olejnik. Over the past decade, ambient light sensors haveRead More →
The Chinese security Xudong Zheng is warning of Homograph Phishing Attacks are “almost impossible to detect” also to experts. The Chinese security researcher Xudong Zheng has devised a phishing techniqueRead More →
The InterContinental Hotels Group (IHG) claims the implementation of its Secure Payment Solution (SPS) has helped to minimize a recent data breach that may have affected as many as 1,000Read More →
Hajime battles with Mirai for control over the Internet of poorly secured things. Mirai, the botnet that threatened the Internet as we knew it last year with record-setting denial-of-service attacks,Read More →
Sensors in phones running both iOS and Android reveal all kinds of sensitive info. Smartphones know an awful lot about us. They know if we’re in a car that’s speeding,Read More →