Please turn on your JavaScript for this page to function normally.
Android malware
Android backdoor GhostCtrl can do many unusual things

There is no shortage of Android malware, but it’s not often that one encounters an Android threat that can do as much as the GhostCtrl backdoor. According to Trend Micro …

Europe
As UK govt calls for encryption backdoors, EU lawmakers propose a ban on them

As the UK gets hit by terror attacks one after the other, the government’s cry for making sure terrorists and criminals can’t find “safe spaces” online …

biohazard
Backdoored Firefox extension checks Instagram for C&C info

Turla, an APT cyberespionage group that has been targeting corporations, intelligence and other government agencies for years, is using a malicious Firefox extension to …

trojan
Dok Mac malware intercepts victims’ web traffic, installs backdoor

A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …

Windows
Script for remote DoublePulsar backdoor removal available

NSA’s DoublePulsar backdoor can now be remotely uninstalled from any infected Windows machine, thanks to the updated detection script provided by security firm Countercept. …

NSA
Tens of thousands Windows systems implanted with NSA’s DoublePulsar

Has your Windows machine been implanted with NSA’s DoublePulsar backdoor? If you haven’t implemented the security updates released by Microsoft in March, chances …

quantum
WWW inventor Tim Berners-Lee opposes encryption backdoors

As the de-facto inventor of the world wide web, Sir Tim Berners-Lee’s opinions on things like online privacy and encryption backdoors should carry a lot more weight than …

WordPress
Fake SEO plugin backdoors WordPress installations

Administrators of WordPress sites, beware! A fake SEO plugin is being used by attackers to compromise WP installations. The plugin in question is named WP-Base-SEO, and is a …

Apple
XAgentOSX Mac malware linked to Russian hacking group

Researchers have discovered and analyzed a new piece of Mac malware that is believed to be used by the Sofacy (aka Fancy Bear, aka Pawn Storm, aka APT28) hacking group. …

Apple
Fruitfly: Unusual Mac backdoor used for tightly targeted attacks?

Researchers have found and analyzed a Mac backdoor that is unusual in many ways. The malware – detected as OSX.Backdoor.Quimitchin by Malwarebytes but dubbed Fruitfly by …

backdoor
ENISA says crypto backdoors are a bad idea

“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …

Sony IP camera
80 Sony IP camera models come with backdoors

80 different models of Sony IPELA Engine IP Cameras have multiple backdoors that can be misused by attackers to take control of the device, disrupt its functionality, add it …

Don't miss

Cybersecurity news