Quantcast
Browsing all 4495 articles
Browse latest View live

All-Python malware nasty bites Windows victims in Poland

Slurps keystrokes, mines Bitcoin, even sets up web servers Malware authors have put together a strain of malicious code written entirely in Python, in what may turn out to be an experiment in creating...

View Article


Judge: If feds find drugs on your car, pics of cash on your phone, you’re...

Omar Bárcena A judge in Southern California has ruled that a recent federal agents’ search of a man’s cellphone as he was crossing into the United States was entirely lawful. The case, known as United...

View Article


Exploit kit writers turn away from Java, go all-in on Adobe Flash

312% increase in Flash vulns over 2014, says study Exploit kit writers are no longer fussed about Java vulnerabilities, focusing their attention almost entirely on Adobe Flash. All of the top 10...

View Article

Viber follows WhatsApp in adding end-to-end encryption to its messaging service

Viber, a popular instant messaging and voice-over-IP service provider with more than 700 million users, has implemented end-to-end encryption to protect its customers' communications against snooping....

View Article

Outdated Git version in OS X puts developers at risk

The OS X command line developer tools include an old version of the Git source-code management system that exposes Mac users to remote code-execution attacks. "If you rely on machines like this, I am...

View Article


Attackers Using New Tool to Exploit Reporters, Rights Workers in Asia

Arbor Networks, which looks at some recent spear-phishing campaigns and finds some common threads, reveals the tactics and technologies the attackers are using. Attackers are likely using a new tool to...

View Article

Samsam Server-Side Ransomware Targets K-12 Schools, Hospitals

A new ransomware program uses vulnerabilities in the JBoss application server to infect networks, with attackers focusing on health care organizations and schools, according to Cisco. Criminals have...

View Article

VXers pass stolen card data over DNS

NewPosThings back as Multigrain, says Fireeye The NewPosThings malware has spawned an offspring that exploits the DNS protocol to sneak data past firewalls. The VXers have reasoned DNS has a couple of...

View Article


Speaking in Tech: Comparing Apples to BlackBerrys and Cooks to Chens

Plus: Did you have a phreaky past? Let's talk SS7 Podcast Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela.This week, Greg is out while Ed and Sarah talk about Theranos, BlackBerry, phone hacking...

View Article


Antitrust chief: Google’s restrictions on Android device makers breach EU law

Google faces more competition charges in the European Union after the 28-member state bloc's antitrust commissioner concluded in a preliminary decision that the company had abused its dominant...

View Article

EFF sues to uncover government demands to decrypt communications

The Electronic Frontier Foundation is suing the U.S.Department of Justice over its failure to disclose if Internet companies have been compelled to decrypt user data and communications. The EFF action...

View Article

“Dr. Death” pleads guilty to making, selling AR-15 rifle components

This is a stripped (and fully-milled) AR-15 lower.Madison Scott-Clary A man in Sacramento, California has pleaded guilty to one count of unlawful manufacture of a firearm and one count of dealing...

View Article

Can You School the Navy, Marines on Cyber Security?

The Navy and Marines are looking for a small business to develop online and in-person courses for staff. The Navy and Marines are planning a five-year cyber-security training program for civilian and...

View Article


Oracle releases 136 security patches for wide range of products

Oracle has released another monster quarterly security update containing 136 fixes for flaws in a wide range of products including Oracle Database Server, E-Business Suite, Fusion Middleware, Oracle...

View Article

DRAM bitflipping exploits that hijack computers just got easier

An-dNew research into the "Rowhammer" bug that resides in certain types of DDR memory chips raises a troubling new prospect: attacks that use Web applications or booby-trapped videos and documents to...

View Article


Man fired after posting violent Lego videos featuring his coworkers

Enlarge pengrin A New York nursing home food-service worker who lost his job after posting allegedly violent videos depicting his coworkers to Facebook is ineligible for unemployment benefits, a state...

View Article

Oracle security update includes Java, MySQL, Oracle Database fixes

Administrators who support Java applications and various Oracle databases should pay close attention to the latest quarterly security update from Oracle, as more than a third of the security fixes...

View Article


Viber Turns On End-to-End Encryption

Viber has enabled end-to-end encryption and a new feature known as hidden chats. Viber is the latest messaging app to turn on end-to-end encryption, but for those who want extra privacy, the service...

View Article

WatchGuard Launches Global Technology Partner Program

AlienVault and ManagedMethods among first to join integration initiative21 April 2016 – WatchGuard Technologies has announced a new Technology Partner Program branded under its award-winning...

View Article

Check Point chugs on: Profits and revenues up despite volatile market

CEO warns that he's 'cautious as regards overall IT industry spending' Check Point’s share price has dipped a touch after the firm reported lacklustre Q1 financial results. During the first quarter...

View Article
Browsing all 4495 articles
Browse latest View live