rss Last update Hackers used Twitter to target US systems: researchers, 1 hour ago

Security news

Cellphones can steal data from 'air-gapped computers'

Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...

dateJul 28, 2015 in Security
shares46 comments 0

Italian surveillance company hacked, documents stolen

An Italian surveillance firm known for selling malicious software used by police bodies and spy agencies has succumbed to a cyberattack, the firm's spokesman said Monday, confirming an embarrassing breach which sent documents ...

dateJul 06, 2015 in Security
shares47 comments 0

NSA planned hack of Google app store

The US National Security Agency developed plans to hack into data links to app stores operated by Google and Samsung to plant spyware on smartphones, a media report said Thursday.

dateMay 21, 2015 in Security
shares111 comments 1

Mumblehard targets servers running Linux and BSD

Security watchers are talking about a family of malware that infects Linux and BSD servers. Marc-Etienne M. Léveillé, ESET malware researcher, has provided details about Linux/Mumblehard, which targets servers running Linux ...

dateMay 04, 2015 in Security weblog
shares886 comments 0

BitWhisper turns up heat on air-gap security

Ben Gurion University reported Monday that researcher Mordechai Guri, assisted by Matan Munitz and guided by Prof. Yuval Elovici, uncovered a way to breach air-gapped systems—that's quite something considering that air-gapped ...

Security meet hears about "No iOS Zone" vulnerability

At the RSA security conference in San Francisco. a security firm's researchers presented what they said was a vulnerability allowing attackers to crash iOS devices in range of a WiFi hotspot. Chris Mills in Gizmodo reacted ...

Hackers keep trying new targets in search of easy data

The health care sector has become the hot target for hackers in recent months, according to researchers at Symantec, a leading cybersecurity company that says it's also seeing big increases in "spear-phishing," ''ransomware" ...

Corporate accounts targeted in Dyre Wolf campaign

A sophisticated and brazen theft operation has been brought to attention this month by IBM Security, which refers to it as the "Dyre Wolf Campaign." It has been active and successful, having stolen over $1 million from targeted ...

How safe is encryption today?

When checking your email over a secure connection, or making a purchase from an online retailer, have you ever wondered how your private information or credit card data is kept secure?

Halifax testing ECG wearable for identity authentication

We have to think a lot about creating, losing, restoring, renaming and managing our passwords. Users and vendors are interested in finding better ways to deliver protection that will not be difficult to use. Technologists ...

Project Zero sheds more light on rowhammer problem

Researchers have discussed exploits with some DRAM memory devices, allowing attackers access to target machines. That was a Tuesday report from Threatpost's editor-in-chief Dennis Fisher, who is also security evangelist for ...

Lenovo stops Superfish preloads and issues advisory
Social network analysis privacy tackled
Correction: Visa-Travel Tracker story
Privacy is dead, Davos hears
Sites stumble on to malware path with plugin exploit
Phone snooping via gyroscope to be detailed at Usenix
BlackBerry rides with Boeing on self-destruct phone
New Bond script stolen in Sony hack
FIDO specs to pave way for post-password era

Find more news articles via sort by date page