
Did Tesco Bank attackers guess victims’ payment card details?
A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …

AirDroid app opens millions of Android users to device compromise
Tens of millions of users of AirDroid, a remote management tool for Android, are vulnerable to man-in-the-middle attacks that could lead to data theft and their devices being …

65% of social engineering attacks compromised employee credentials
Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …

New infosec products of the week: December 2, 2016
Trend Micro offers Deep Security as a Service on AWS Marketplace Trend Micro announced the availability of Trend Micro Deep Security as a Service on AWS Marketplace. This new …

Massive cybercrime infrastructure demolished
After more than four years of investigation, the Public Prosecutor’s Office Verden and the Lüneburg Police in cooperation with the US Attorney’s Office for the Western …

Online credit card fraud up 20% Black Friday to Cyber Monday
Iovation released new data that shows card-not-present fraud increased significantly from Black Friday to Cyber Monday 2016 when compared to the same period in past years. …

50% of enterprises will be cloud-first by 2021
SailPoint surveyed customers and attendees at this week’s Gartner IAM Summit about their plans for cloud adoption in the next five years. Of the 100 survey respondents, 30 …

Insecure pacemakers can be easily hacked
A group of researchers has discovered that it’s not that difficult for a “weak adversary” with limited resources and capabilities to fiddle with or even shut …

SAMRi10: Windows 10 hardening tool for thwarting network recon
Microsoft researchers Itai Grady and Tal Be’ery have released another tool to help admins harden their environment against reconnaissance attacks: SAMRi10 (pronounced …

Next level red teaming: Working behind enemy lines
The term “hacker” calls forth both positive and negative mental pictures, but I can bet that there are not many people, even in the infosec community, to whom the …

Actively exploited Firefox, Tor Browser 0-day patched, update now!
Mozilla and the Tor Project have released security updates that fix the Firefox 0-day flaw that was spotted being exploited to de-anonymize Tor Browser users. It is still …

Europol terrorism investigations data found exposed online
700 pages of confidential dossiers, which included details about terrorism investigations in Europe, have been found exposed on the Internet by the reporters of Dutch TV …