May 25, 2015 Added by:Tripwire Inc
For some reason, Europe’s ‘The Final Countdown’ was playing in my head as I sat and pondered this write-up. I suppose that’s fitting given that we are about to cross the 60-day mark until Windows Server 2003 goes End-of-Life.
May 25, 2015 Added by:Joe Weiss
One of the most important aspects in addressing ICS cyber security is the concept of “systems of systems”. Unlike IT where you can test a box and label it and the system secure, control system cyber security requires testing the overall system.
May 12, 2015 Added by:Eduard Kovacs
The developers of MacKeeper, the controversial utility software suite for OS X, have patched a critical vulnerability that could have been exploited to remotely execute arbitrary code on affected systems.
May 07, 2015 Added by:Brian Prince
The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.
April 30, 2015 Added by:Eduard Kovacs
Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.
April 30, 2015 Added by:Tripwire Inc
Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.
April 28, 2015 Added by:Eduard Kovacs
The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.
April 22, 2015 Added by:Malwarebytes
Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.
April 21, 2015 Added by:Eduard Kovacs
Apple’s recent fix for the OS X privilege escalation vulnerability dubbed “rootpipe” isn’t effective, according to researchers.
April 13, 2015 Added by:Eduard Kovacs
More than a dozen command and control (C&C) servers used by the Simda botnet were seized last week by law enforcement authorities coordinated by Interpol.
April 01, 2015 Added by:Malwarebytes
WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.
March 24, 2015 Added by:Eduard Kovacs
Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015