Security firm clarifies power-station ‘SCADA’ malware claim
It’s not the next Stuxnet, says SentinelOne, it’s just very naughty code. Malware hyped as aimed at the hear of power plants is nothing of the sort according to securityRead More →
It’s not the next Stuxnet, says SentinelOne, it’s just very naughty code. Malware hyped as aimed at the hear of power plants is nothing of the sort according to securityRead More →
Nothing is safe nowadays, not even 3D printers. A hacker could breach a company’s network, hack into a 3D printer, and alter small operational details to produce defective products that couldRead More →
The U.S. government’s reach got a little bit shorter Thursday when the Second Circuit Court of Appeals reversed a lower court decision and ruled that the U.S. government can’t forceRead More →
Hackers who want to make money but don’t want to get involved in the messy business of extracting payment from victims have turned to a malware-as-a-service business model. They write the codeRead More →
There is a common misconception that all things Linux are bulletproof. The fact is, no software is infallible. When news of a Linux vulnerability hits, some Windows and Mac fans like to tauntRead More →
The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark web Following the first ever instance of macRead More →
Juniper Networks patched a crypto bug tied to its public key infrastructure that could have allowed hackers to access the company’s routers, switches and security devices and eavesdrop on sensitiveRead More →
Neutrino EK now features support for CVE-2016-0189. The crooks behind the Neutrino Exploit Kit (EK) didn’t wait long to update their automated malware infection technology with exploit code foolishly open-sourced byRead More →
Patch Tuesday wasn’t just about browser bugs. Microsoft has quietly killed a vulnerability that can be exploited to unlock ARM-powered Windows RT tablets and boot non-Redmond-approved operating systems. The Register hasRead More →
Some of the data looks legit, some looked fake. A group of hackers who call themselves “Pravyy Sector” [Right Sector] are extorting the Polish Government on Twitter, threatening to releaseRead More →