Google’s upcoming Android L update will do away with passwords - at least for dedicated Google fans, with Google devices such as...
/** * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC * * Vitaly Nikolenko * http://hashcrack.org * * Usage: ./poc [file_path] * *...
Personal information on 1.3 million people including bank details, medical records and home addresses may have leaked after a security incident where...
The Wi-Fi network name and password for the security center at the World Cup were accidentally leaked online by a newspaper, and...
Dozens of car washes across Connecticut have leaked “countless” credit and debit card details to cybercriminals, according to a new investigation by...
Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The...
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games...
Usually we see cyber attacks, hacking and warnings from online hacktivists Anonymousbut a song? Well here’s what happened. Micheal Jackson’s famous hit...
Scammers and fraudsters think nothing of scraping the barrel of taste, if they believe it will help them earn a few dollars.
German Humanist Union, an independent civil liberties organization, has awarded Snowdenwith the Fritz Bauer Prize for exposing NSA’s controversial surveillance practices. The...
Amazingly, it was way back in 2011 that I came across my very first World Cup 2014 scam. Surely that merits a...
We know how drones are used for surveillance, target killings or in some cases to save human lives, but now a South African company...
Blackmailers force internet site Code Spaces out of business, leaving customers in the lurch.
The usual pattern we see when dealing with exploit kits starts with a legitimate website that gets compromised and used to automatically...
A California oil company that lost thousands after being attacked by hackers has won $350,000 in a legal settlement after suing its...
As the World Cup heads into its third week, there’s a new phishing scam to be aware of. EA Games’ FIFA 14...
ESET researchers recently came across a targeted attack against the Vietnamese government's Ministry of Natural Resources and Environment (MONRE).
With the first half of the year almost over, it's time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar,...
Ancestry.com has become the latest site to be taken down by a distributed denial-of-service (DDOS) attack. The genealogy website was shut down...
Nokia paid several million euros to criminals who threatened to reveal the source code for part of its smartphone operating system seven...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw