Road Warriors: Beware of ‘Video Jacking’
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
ANONYMOUS POLAND HACKED WORLD ANTI-DOPING AGENCY AND COURT OF ARBITRATION FOR SPORT’S SERVERS’ SERVER AND LEAKED PERSONAL DETAILS FOR GOD KNOWS WHAT REASON! A Twitter account claiming affiliation with Anonymous PolandRead More →
Over the last month and a half, ThreatConnect has authored a number of blog posts pulling at strands of a nebulous Russian spiderweb of malicious infrastructure – one data pointRead More →
Scylex – “the next big thing” in terms of banking trojan. Threat-intel experts from Heimdal Security and the CSIS Security Group have uncovered a new banking trojan called Scylex, currently advertisedRead More →
Corporate cybercrime and information theft has become a very lucrative business for malware developers. Not only does it allow them to steal corporate secrets to sell to the highest bidder, but it canRead More →
“DiskFiltration” siphons data even when computers are disconnected from the Internet. Researchers have devised a new way to siphon data out of an infected computer even when it has been physicallyRead More →
Sławomir Jasek with research firm SecuRing is sounding an alarm over the growing number of Bluetooth devices used for keyless entry and mobile point-of-sales systems that are vulnerable to man-in-the-middleRead More →
The good news? Hacks are limited for now. The bad news? Hackers will get better. Security researchers are eager to poke holes in the chip-embedded credit and debit cards that haveRead More →
With the threat of ransomware hanging over every company’s head, does it make sense for companies to stockpile a few bitcoins in the event of a ransomware attack? Yeah, yeah, IRead More →
What do spies use to chat online? A terribly ugly Windows programme. At least, that’s what the Five Eyes intelligence alliance (made up of the US, UK, Australia, New Zealand andRead More →