A multi-pronged attack on Android devices has been uncovered, which incorporates a bevy of threat vectors and social engineering tricks into a single scheme involving the Marcher Android banking Trojan.
Read MoreThe share of Linux botnets is continuing to grow—accounting for 70% of attacks in Q3, compared to 51% in Q2.
Read MoreMillions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras, Senrio reported this week.
Read MoreA Massachusetts systems administrator is facing charges of breaking the Computer Fraud and Abuse Act, trespassing, and conversion – using other people’s property for a crime – after booby-trapping his former employer’s servers.
Read MoreVulnerabilities found by researchers in Bosch’s Drivelog Connect product can be exploited by hackers to inject malicious messages into a vehicle’s CAN bus. The vendor has implemented some fixes and is working on adding more attack protections.
Read MoreIdentity theft is a type of fraud that’s directed squarely against individuals, but to believe that businesses don’t suffer any consequences or costs associated with it is simply wrong.
Read MoreAmazon-owned video streaming site Twitch is taking a scorched-earth approach in a bid to ferret out who is behind a “malicious spambot.” The bots have been flooding streamers’ public chats with offensive, repetitive messages that have sometimes rendered their channels “unusable.”
Read MoreHackers have started adding data-wiping routines to malware that’s designed to infect internet-of-things and other embedded devices. Two attacks observed recently displayed this behavior but likely for different purposes.
Read MoreThere’s a new zeroday attack in the wild that’s surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word.
Read MoreIBM says that more than four billion records were leaked online in 2016, including a mix of credit card data, passwords and personal health information. The number of different bits about people’s private lives leaked online last year were up from 600 million exposed records in 2015, and one billion exposed records in 2014.
Read MoreA German researcher spotted a flaw in a networked dishwasher that could allow an attacker to access sensitive information on the appliance’s network.
Read MoreApple is reportedly in the grip of a very public extortion attempt, with the blackmailers promising to wipe 200 million iCloud accounts and reset the iPhones to factory default if they do not receive tens of thousands of dollars.
Read MoreThe blurb for a presentation at the Black Hat Asia hacking conference this week would likely concern any iPhone owner: “The victim will only have to join the Wi-Fi network, and then the device will be compromised without any user interaction, bypassing all iOS mitigations and sandboxes.”
Read MoreA US Secret Service laptop with Trump Tower floor plans and other sensitive material has apparently been stolen from an agent’s vehicle in New York.
Read MoreCheck Point researchers today revealed a new vulnerability on WhatsApp and Telegram’s online platforms – WhatsApp Web & Telegram Web. By exploiting this vulnerability, attackers could completely take over user accounts, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more.
Read MoreCanadian authorities managed to halt a cyberattack against its statistics agency that exploited a software flaw in Apache Struts 2, a web application development framework.
Read MoreOne of the unpleasant realities of having a ubiquitous and very public online profile through social media is the risk of attracting an unwanted “follower” or “friend” who turns into an online-troll or stalker.
Read MoreWhenever I wonder what will eventually happen to Twitter, which is something I think about literally every day, I remember this Jessica Livingston tweet from September.
Read MoreKnowing the specifics of who engages with your social media account and how they interact with it can be valuable information. When it comes to Twitter, the micro-blogging platform makes some information — like followers, likes, retweets — public.
Read More