All-Python malware nasty bites Windows victims in Poland
Slurps keystrokes, mines Bitcoin, even sets up web servers Malware authors have put together a strain of malicious code written entirely in Python, in what may turn out to be an experiment in creating...
View ArticleJudge: If feds find drugs on your car, pics of cash on your phone, you’re...
Omar Bárcena A judge in Southern California has ruled that a recent federal agents’ search of a man’s cellphone as he was crossing into the United States was entirely lawful. The case, known as United...
View ArticleExploit kit writers turn away from Java, go all-in on Adobe Flash
312% increase in Flash vulns over 2014, says study Exploit kit writers are no longer fussed about Java vulnerabilities, focusing their attention almost entirely on Adobe Flash. All of the top 10...
View ArticleViber follows WhatsApp in adding end-to-end encryption to its messaging service
Viber, a popular instant messaging and voice-over-IP service provider with more than 700 million users, has implemented end-to-end encryption to protect its customers' communications against snooping....
View ArticleOutdated Git version in OS X puts developers at risk
The OS X command line developer tools include an old version of the Git source-code management system that exposes Mac users to remote code-execution attacks. "If you rely on machines like this, I am...
View ArticleAttackers Using New Tool to Exploit Reporters, Rights Workers in Asia
Arbor Networks, which looks at some recent spear-phishing campaigns and finds some common threads, reveals the tactics and technologies the attackers are using. Attackers are likely using a new tool to...
View ArticleSamsam Server-Side Ransomware Targets K-12 Schools, Hospitals
A new ransomware program uses vulnerabilities in the JBoss application server to infect networks, with attackers focusing on health care organizations and schools, according to Cisco. Criminals have...
View ArticleVXers pass stolen card data over DNS
NewPosThings back as Multigrain, says Fireeye The NewPosThings malware has spawned an offspring that exploits the DNS protocol to sneak data past firewalls. The VXers have reasoned DNS has a couple of...
View ArticleSpeaking in Tech: Comparing Apples to BlackBerrys and Cooks to Chens
Plus: Did you have a phreaky past? Let's talk SS7 Podcast Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela.This week, Greg is out while Ed and Sarah talk about Theranos, BlackBerry, phone hacking...
View ArticleAntitrust chief: Google’s restrictions on Android device makers breach EU law
Google faces more competition charges in the European Union after the 28-member state bloc's antitrust commissioner concluded in a preliminary decision that the company had abused its dominant...
View ArticleEFF sues to uncover government demands to decrypt communications
The Electronic Frontier Foundation is suing the U.S.Department of Justice over its failure to disclose if Internet companies have been compelled to decrypt user data and communications. The EFF action...
View Article“Dr. Death” pleads guilty to making, selling AR-15 rifle components
This is a stripped (and fully-milled) AR-15 lower.Madison Scott-Clary A man in Sacramento, California has pleaded guilty to one count of unlawful manufacture of a firearm and one count of dealing...
View ArticleCan You School the Navy, Marines on Cyber Security?
The Navy and Marines are looking for a small business to develop online and in-person courses for staff. The Navy and Marines are planning a five-year cyber-security training program for civilian and...
View ArticleOracle releases 136 security patches for wide range of products
Oracle has released another monster quarterly security update containing 136 fixes for flaws in a wide range of products including Oracle Database Server, E-Business Suite, Fusion Middleware, Oracle...
View ArticleDRAM bitflipping exploits that hijack computers just got easier
An-dNew research into the "Rowhammer" bug that resides in certain types of DDR memory chips raises a troubling new prospect: attacks that use Web applications or booby-trapped videos and documents to...
View ArticleMan fired after posting violent Lego videos featuring his coworkers
Enlarge pengrin A New York nursing home food-service worker who lost his job after posting allegedly violent videos depicting his coworkers to Facebook is ineligible for unemployment benefits, a state...
View ArticleOracle security update includes Java, MySQL, Oracle Database fixes
Administrators who support Java applications and various Oracle databases should pay close attention to the latest quarterly security update from Oracle, as more than a third of the security fixes...
View ArticleViber Turns On End-to-End Encryption
Viber has enabled end-to-end encryption and a new feature known as hidden chats. Viber is the latest messaging app to turn on end-to-end encryption, but for those who want extra privacy, the service...
View ArticleWatchGuard Launches Global Technology Partner Program
AlienVault and ManagedMethods among first to join integration initiative21 April 2016 – WatchGuard Technologies has announced a new Technology Partner Program branded under its award-winning...
View ArticleCheck Point chugs on: Profits and revenues up despite volatile market
CEO warns that he's 'cautious as regards overall IT industry spending' Check Point’s share price has dipped a touch after the firm reported lacklustre Q1 financial results. During the first quarter...
View Article