OS & Software
April 30, 2015 Added by:Tripwire Inc
Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.
April 28, 2015 Added by:Eduard Kovacs
The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.
April 22, 2015 Added by:Malwarebytes
Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.
April 21, 2015 Added by:Eduard Kovacs
Apple’s recent fix for the OS X privilege escalation vulnerability dubbed “rootpipe” isn’t effective, according to researchers.
April 13, 2015 Added by:Eduard Kovacs
More than a dozen command and control (C&C) servers used by the Simda botnet were seized last week by law enforcement authorities coordinated by Interpol.
April 01, 2015 Added by:Malwarebytes
WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.
March 24, 2015 Added by:Eduard Kovacs
Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.
March 18, 2015 Added by:Eduard Kovacs
The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.
March 17, 2015 Added by:Dan Dieterle
When I was working on my Pulling Remote Word Documents from RAM using Kali Linux article, I was curious if you could use the same technique to pull the system passwords, and you can…
March 12, 2015 Added by:Brian Prince
Access to the personal email server used by former U.S. Secretary of State Hillary Clinton was not encrypted or authenticated by a digital certificate for the first three months of her term, research from security firm Venafi has found.
March 10, 2015 Added by:Neohapsis
The old advice to disable the auto-play function in Windows is new again, so take a moment and go to Control Panel – AutoPlay and either change the AutoPlay options to “Take no action,” or disable the feature completely.
March 04, 2015 Added by:Eduard Kovacs
The notorious Angler exploit kit has started leveraging a new technique to ensure that its malicious activities are not interrupted when the domains it uses are blacklisted, researchers at Cisco revealed on Tuesday.
March 04, 2015 Added by:Pierluigi Paganini
A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers.
March 03, 2015 Added by:Brian Prince
According to Sophos, the malware is now hiding the malicious payload in Windows registry instead of writing the file on disk.
March 03, 2015 Added by:Anton Chuvakin
My research into security analytics and Gartner recent forays into so-called “smart machines” research converge in this post. Hilarity ensues!
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015