
Exploit kit targets Android devices, delivers ransomware
Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile …

Bangladesh Bank hackers compromised SWIFT software with bespoke malware
Bit by bit, indications about how the attackers who targeted Bangladesh’s central bank managed to take off with some $80 milllion (of the nearly $1 billion they aimed …

Info on 93 million Mexican voters found on an Amazon cloud server
Sensitive personal information of over 93 million Mexican voters has been found, unprotected and accessible to anyone who knew where to look. Last Friday, researcher Chris …

Critical flaws in HP Data Protector open servers to remote attacks
Hewlett Packard has released critical security updates for its HP Data Protector software, which fix vulnerabilities that could allow remote code execution or unauthorized …

Top 10 web hacking techniques of 2015
Now in its tenth year, the Top 10 List of Web Hacking Techniques takes a step back from the implications of an attack to understand how they happen. The list is chosen by the …

Attackers opt for discreet methods to spy inside the network
For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …

Most organizations still lack visibility into database assets
Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman …

Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

Week in review: Opera’s VPN is just a proxy, GDPR compliance, hacking traffic sensors
Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he …

PGP-encrypted comms network allegedly used by criminals shuts down
The Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they …

A password for your eyewear computer: The sound of your skull
Could the unique frequency response your skull makes when hit with an ultrasonic signal be a good way for authenticating yourself to an eyewear computer (e.g. Google Glass, or …

Opera browser’s VPN is just a proxy, here’s how it works
Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted