Analytics services are tracking users via Chrome extensions
It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …
How malware peddlers trick users into enabling Office macros
A week ago, SANS ISC handler and freelance security consultant Xavier Mertens analyzed a Word document containing malicious macros, and unearthed in it a VBA function that …
New law allows French police to seize and search electronic devices without a warrant
In the wake of the Paris attacks, the French Senate passed on Friday a bill that extends the state of emergency declared after the attacks to three months.The bill expands …
Man stole special agent’s identity, executed a complex identity theft scheme
Rohit Jawa, 25, formerly of Cincinnati, Ohio, pleaded guilty to an indictment charging him with eight counts of wire fraud and one count of aggravated identity theft.Based on …
PoS malware hit 54 Starwood luxury hotels
Starwood Hotels & Resorts, the international hotel chain that owns and operates hotels under the Westin, Sheraton, W Hotels, St. Regis, and Le Méridien brands, has …
Perspectives on the state of Internet security
In today’s digital world terms like hacker and worm are widely recognized. But in November 1988 remote breaching was unheard of, at least until the Morris worm was …
The top 7 improvements in Nmap 7
Nmap 7 is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012.The top 7 …
Users find backdoors to do their job
Balabit unveiled the results of its pan-European survey into the current state of IT security. The survey looked at how organisations balance IT security and business …
Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016
Here’s an overview of some of last week’s most interesting news, interviews and articles:Android adware tricks users into giving it power to secretly download …
ISIS operation security guide gives insight into group’s cybersecurity practices
Do ISIS terrorists use encryption, and if so, what tools do they favour?The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, …
Android adware tricks users into giving it power to secretly download other apps
Earlier this month Lookout revealed the existence of three adware families – Shuanet, ShiftyBug and Shedun – that secretly root Android devices and are extremely …
New Dyre variant can target Windows 10 and Microsoft Edge users
As Microsoft continues to push Windows users towards adopting the latest version of the popular OS, malware authors have started adding support for it. Heimdal Security …
Featured news
Resources
Don't miss
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools