Credit card info stolen in BigFish Games site compromise
Seattle-based casual gaming company Big Fish Games has has its site and personal and financial information of some of its users compromised in an attack that started on last …
Beware of fake Facebook “Copyright Violations” warnings
The latest Facebook-themed phishing messages doing rounds are trying to trick users into believing they are “making copyright violations” on their Facebook page. …
Arabic cyber espionage group attacking high profile victims
Kaspersky Lab discovered Desert Falcons, a cyber-espionage group targeting high profile organizations and individuals from Middle Eastern countries. The list of targeted …
Pwn2Own 2015: New rules, prizes, and potential problems
If you intend to participate in the Pwn2Own competition at the CanSecWest 2015 conference on March 18 and 19 in Vancouver, Canada, you would do well to consult with a legal …
Vawtrack malware peddlers turn to malicious macros
Cybercriminals spreading new versions of the Vawtrak banking Trojan are the latest ones to use the once again popular macro-based attack. Popular in the early 2000s, this type …
Beware of fake Windows 10 “activators”
The considerable interest users have shown for testing Microsoft’s Windows 10 Technical Preview version has not passed unnoticed by cyber scammers and malware peddlers. …
Flaw in Netgear Wi-Fi routers exposes admin password, WLAN details
A number of Netgear home wireless routers sport a vulnerability that can be misused by unauthenticated attackers to obtain the administrator password, device serial number, …
What’s critical to the success of the Internet of Things?
Managing identities and access is critical to the success of the Internet of Things (IoT), but in its current form identity and access management (IAM) cannot provide the …
Hackers and makers to meet in Amsterdam at HITB Haxpo
This year’s Hack In The Box Security Conference in Amsterdam will once again feature the HITB Haxpo. This technology expo for hackers, makers, builders and breakers, …
Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware
For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …
Is there an overarching organization that helps Arab hackers?
Trend Micro researchers have unearthed two separate but closely linked malware campaigns attributed to Arab parties. The first one, dubbed Operation Arid Viper, is aimed …
Carbanak cyber gang stole hundreds of millions from banks
Since late 2013, an international cyber criminal group has been targeting banks around the world and has made off with $300 million – possibly even more – by …
Featured news
Resources
Don't miss
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?