Please turn on your JavaScript for this page to function normally.
Android Trojan pesters victims, won’t take no for an answer

If an app won’t stop badgering you to give it administrator rights to your Android device, chances are you have picked up malware somewhere. Malware peddlers are …

talk speak speaker
For PoC exploits, go on Twitter

Proof-of-Concept exploits are increasingly being shared and discussed online, threat intelligence firm Recorded Future has discovered. Between March 22, 2015 and the present …

Dridex botnet hacked, delivers dummy file

Someone is toying with the Dridex botmasters. The botnet, or at least one or more of its subnets that are sending out spam email delivering Locky ransomware, has been …

botnet
Jaku botnet hides targeted attacks within generic botnet noise

Botnets are usually created by cyber criminals that use them to launch DDoS attacks, deliver spam, effect click fraud. The recently discovered Jaku botnet can effectively do …

danger
Android banking malware may start using adware tricks

Android banking and credential-stealing malware with screen overlay capabilities is on the rise, but for it to be effective, it must detect when banking, email, social media …

tax
Fraudsters steal tax data from ADP customer portal

ADP has confirmed identity thieves managed to access W-2 data of a number of its customers’ employees through the company’s customer portal, but says that the …

Web servers and sites under attack via ImageMagick zero-day flaw

A zero-day remote code execution flaw has been found in ImageMagick, an image processing library that allows image uploads from untrusted users (site visitors) and is widely …

biohazard
Ransomware enters companies through RDP servers

Attackers wielding ransomware are targeting enterprises through an often-found hole in the corporate network: Internet facing, poorly secured remote desktop servers. According …

smartthings hub
Samsung’s smart home platform flaws let attackers fiddle with your doors

Researchers have managed to exploit design flaws in the Samsung SmartThings smart home programming platform and successfully mount a series of attacks that could result in …

Google Chrome
Malicious Chrome update actively targeting Android users

A fake malicious Chrome update is being actively pushed onto Android users, saddling them with information-stealing malware that can be uninstalled only by restoring the …

The Information Systems Security Officer's Guide, Third Edition
Review: The Information Systems Security Officer’s Guide, Third Edition

About the author Dr. Gerald Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security …

justice sentence gavel law court
US FISC approved all surveillance requests in 2015

The US Foreign Surveillance Intelligence Court (FISC) has approved every electronic surveillance request for foreign intelligence purposes it has received in 2015. As it turns …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools