Archive

If you’re battling hackers, it’s helpful to know who they actually are. Unfortunately, tracking down the culprits of an attack has always been difficult thanks to VPNs, TOR, and other methods used to disguise the source of a digital assault.

Popular die cast car manufacturer Maisto has been slinging the deadly Angler exploit kit which in turn installs the Cryptxxx ransomware on victim machines. The site appears to have been compromised through an outdated Joomla content management system in what

The man behind the creation of Gozi banking malware was sentenced on May 2 to time served, 37 months, and a $7 million fine for his role in creating and distributing the malicious software that infected more than one million

For Android users, using their devices has become so much risky nowadays due to the emergence of a new malware every other day. This time, a dangerous malware has surfaced that appears to be just another harmless Google Chrome’s mobile

Chrome is the most popular Web browser, Windows God Mode gets hit with malware, Apple thinks you’ll be upgrading soon, Google Keyboard gets a major update, and Apple Watch is improved immeasurably by Windows 95. Google Chrome is now THE

The Windows “God Mode” tweak lets you quickly access a number of advanced functions — it’s a handy easter egg that has been a part of Windows for the last decade. However, McAfee researchers have now spotted a piece of

Setting up encrypted communication by yourself is hard. If you’ve ever set up PGP for your email or implemented an off-the-record chat in Pidgin, you know that it can be a clunky, burdensome process.  Thankfully, cryptographers are working to make it easier

Microsoft on Monday revealed that hospitals and other IT shops should expect the next generation of its database to be available on June 1. Dubbed SQL Server 2016, the forthcoming iteration brings a focus on analytics, cloud capabilities, data encryption

Ransomware attacks have been launched against “critical infrastructure organizations” in Canada, a Senate committee heard this week, and the number of attempts to hold sensitive data for ransom is likely to increase in the coming years. Testifying before the Senate’s National

Hackers who broke into Qatar National Bank (QNB)’s systems and stole thousands of customers’ records have attacked a second bank and plan to leak more data, Gulf News reported. Quoting a security analyst from Middle East software company Kaspersky Lab,

Nintendo has taken popular indie gravity-flipping platform game VVVVVV down from the 3DS eShop after hackers revealed the game can be used to help load unsigned code onto the system. On Sunday, a hacker going by the handle ShinyQuagsire published

A ‘hit list’ containing the names of US government personnel has been posted on a social networking channel for sympathizers of IS. It seems that a tit-for-tat cyber war with the FBI is intensifying. The “hit list” contains the names

Hacking a car in Michigan could become a felony with a life sentence, if proposed legislation introduced last week becomes law in the home state of the US auto industry. The proposed legislation, Senate Bill 927, would make it illegal

It seems that smart homes can be not that smart, according to an in-depth analysis by a group of researchers at the University of Michigan and Microsoft, which was reported on by Wired. The researchers performed tests on Samsung‘s SmartThings

A large number of websites are vulnerable to a simple attack that allows hackers to execute malicious code hidden inside booby-trapped images. The vulnerability resides in ImageMagick, a widely used image-processing library that’s supported by PHP, Ruby, NodeJS, Python, and

Hackers looking to break into companies could do so with the help of a $350 device that can be purchased online from Amazon or eBay, new research shows. By taking advantage of the way most employee ID badges work, hackers could