Please turn on your JavaScript for this page to function normally.
Fake guides and cracked apps on Google Play Books lead to malware

Google has become pretty swift at finding and removing fake and malicious apps from its Google Play store, but there is one part of it where malware peddlers still seem to …

Banking Trojans target nearly 1,500 financial institutions

Nine of the most common and sophisticated financial Trojans in use are targeting 1,467 financial institutions in 86 countries, says a Symantec report compiled after the …

New PoS malware family discovered

A new family of PoS malware has been discovered and analyzed by Trend Micro researchers. They dubbed it PwnPOS, and believe that it has been in used since 2013, possibly even …

US air traffic control system is riddled with vulnerabilities

A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration (FAA) still needs to …

Beware of spyware concealed inside games

Monitoring tools can be used for legitimate and malicious purposes. The first category includes parental control and employee monitoring software, the second one screenshot …

FREAK bug breaks SSL encryption for Android and Apple devices

A flaw in OpenSSL and Apple’s Secure Transport implementation of SSL and TLS protocols is putting millions of Android and Apple device users as well as visitors of …

Flaw in GoPro update mechanism reveals users’ Wi-Fi passwords

A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials …

D-Link fixes critical router flaws

D-Link has released new firmware for its DIR-820L Wi-Fi dual band cloud router, which fixes a number of security vulnerabilities. One of these can apparently be exploited by …

Signal 2.0: Cross-platform encrypted voice and text communication app

Open Whisper Systems has released a new version of Signal, its free, open source iOS app for end-to-end encrypted voice calls. As announced in July last year, when the first …

Phishers target victims of iOS device theft

A clever phishing scheme has been spotted targeting users who have had their iPad or iPhone stolen, leading researchers to believe that it has been set up by a criminal group …

Uber’s on a hunt for the attacker that compromised its drivers’ database

Late last week, Uber’s Managing Counsel of Data Privacy Katherine Tassi has revealed that the company has suffered a data breach. One of its databases, which contains …

0-day flaw in Seagate NAS devices endangers thousands

Seagate’s Business Storage 2-Bay NAS line of products, which is popular both with home and business users, sports a zero-day remote code execution vulnerability that can …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools