Please turn on your JavaScript for this page to function normally.
Cyber attack on US power grid could result in losses up to $1 trillion

When, on Wednesday, the New York Stock Exchange halted trading, The Wall Street Journal website went down, and United Airlines grounded flights – all practically at the …

Hacking Team’s Flash 0-day exploit used against Korean targets before it was leaked

The Adobe Flash zero-day (CVE-2015-5119) exploit found in the Hacking Team’s leaked data has already been added to several exploit kits, but Trend Micro researchers have …

Popular Android games unmasked as phishing tools

“ESET researchers have discovered a new, ingenious, yet very simple Facebook phishing scheme: playable Android games that, before they are started, ask users to enter …

Sophisticated, successful Morpho APT group is after corporate data

Two reports published on Wednesday by Symantec and Kaspersky Lab detail the recent attacks executed by an unusual APT group they have dubbed Morpho and Wild Neutron.The group …

Teenage Lizard Squad hacker found guilty of 50,700 charges

A 17-year-old member of the infamous Lizard Squad has been found guilty of 50,700 charges by a Finnish court, but won’t serve his sentence in a prison.Among other …

Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea

Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee …

Flash 0-day exploit found in Hacking Team’s leaked data exploited by criminals

Human rights and privacy activists and journalists are actively reviewing the data stolen in the Hacking Team breach.Reporters of The Intercept have concentrated on going …

Hacking Team scrambling to limit damage brought on by explosive data leak

Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker …

Fake Android battery monitor app thoroughly compromises users’ devices

“Downloading apps from Google Play is a safer proposition than doing it from third party markets, but despite Google using an automated app scanning service …

Another malware building toolkit leaked, botnets already popping up

“Another malware building toolkit has been leaked, allowing less tech-savvy crooks to generate a fully functional variant of the KINS banking Trojan and to inject its …

Old MS Office feature can be exploited to deliver, execute malware

A Microsoft Office functionality that has been in use since the early 1990s can be exploited to deliver malicious, executable files to users without triggering widely used …

Let’s Encrypt CA releases transparency report before its first certificate

The non-profit CA launched by the EFF, Mozilla and several other businesses and organizations is determined to gain and retain users’ trust. After hiring outside experts …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools