March 24, 2015 Added by:Eduard Kovacs
Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.
March 18, 2015 Added by:Eduard Kovacs
The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.
March 17, 2015 Added by:Dan Dieterle
When I was working on my Pulling Remote Word Documents from RAM using Kali Linux article, I was curious if you could use the same technique to pull the system passwords, and you can…
March 12, 2015 Added by:Brian Prince
Access to the personal email server used by former U.S. Secretary of State Hillary Clinton was not encrypted or authenticated by a digital certificate for the first three months of her term, research from security firm Venafi has found.
March 10, 2015 Added by:Neohapsis
The old advice to disable the auto-play function in Windows is new again, so take a moment and go to Control Panel – AutoPlay and either change the AutoPlay options to “Take no action,” or disable the feature completely.
March 04, 2015 Added by:Eduard Kovacs
The notorious Angler exploit kit has started leveraging a new technique to ensure that its malicious activities are not interrupted when the domains it uses are blacklisted, researchers at Cisco revealed on Tuesday.
March 04, 2015 Added by:Pierluigi Paganini
A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers.
March 03, 2015 Added by:Brian Prince
According to Sophos, the malware is now hiding the malicious payload in Windows registry instead of writing the file on disk.
March 03, 2015 Added by:Anton Chuvakin
My research into security analytics and Gartner recent forays into so-called “smart machines” research converge in this post. Hilarity ensues!
February 19, 2015 Added by:Electronic Frontier Foundation
There's been some discussion about whether all copies of Superfish use the same root key to perform the MITM attacks
January 05, 2015 Added by:Pierluigi Paganini
The Microsoft Malware Protection Center (MMPC) has recently observed a surge in the infections of malware using macros to spread their malicious code.
November 25, 2014 Added by:Rebecca Herold
As more crooks see how much money their buddies are making, you will see more and more types of ransomware being launched, putting you and your business at risk if you are not on the lookout for the signs of such a crime.
November 11, 2014 Added by:Patrick Oliver Graf
In today’s business environment, the list of overlooked network security threats is endless. Information security professionals are modern-day gladiators, tasked with defending corporate data and networks against both known and unknown threats, but no matter how skilled they are, there will always be new threats to their networks.
October 22, 2014 Added by:Pierluigi Paganini
Security experts at Google and McAfee have discovered a new zero-day vulnerability in Microsoft OLE being exploited in targeted attacks.
October 07, 2014 Added by:Cyphort
Nowadays, as half of newly issued computers in the enterprise are Macs, OSX malware is also becoming more prevalent.
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015