Please turn on your JavaScript for this page to function normally.
WordPress sites hijacked via “free” premium plugins

If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …

Uncommon new worm targets Word and Excel files

Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …

Zorenium bot can now hit iOS users as well

If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …

Google: We didn’t access Arrington’s Gmail account to identify leaker

In the wake of the revelation that Microsoft has accessed a blogger’s Hotmail account in order to discover the identity of an employee who leaked company trade secrets, …

Cerberus app users warned about data breach

Users of the Cerberus anti-theft Android app have been receiving warnings from the Cerberus Security Team, urging them to change their password as they have been reset in the …

Hidden crypto currency-mining code spotted in apps on Google Play

You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …

Banks sue Target and Trustwave for damages due to data breach

The Target data breach was one of the biggest in recent history, and has been calamitous for more than just the customers who have had their information stolen. The latest …

Facebook boasts of superior threat detection system

Facebook has a new internal threat-catching framework that is fed with disparate data from all over the Internet, different vendors, and Facebook’s internal sources, and …

ACLU probes US police’s use of fake cell towers

The American Civil Liberties Union (ACLU) is on a mission to find out which local and state law enforcement forces in the US are using “stingrays” and how, but are …

Over half of Android users fail to lock their phones

An ad hoc survey conducted by Google’s anti-abuse research lead Elie Bursztein has shown that over half of Android users don’t lock their phones in any meaningful …

Nmap’s Fyodor restarts the Full Disclosure mailing list

The Full Disclosure mailing list is back on track, with Nmap’s Gordon “Fyodor” Lyon picking up the mantle put down by John Cartwright. “Upon hearing …

Gameover ZeuS now targets users of employment websites

Some newer variants of the Gameover Zeus Trojan, which is exceptionally good at using complex web injections to perform Man-in-the-Browser (MITB) attacks and gain additional …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools