Archive

FBI has arrested two men from North Carolina for supposedly participating in the Hack The Pentagon program to target high-ranked federal officials. If you remember, Pentagon had undertaken the Hack The Pentagon bug bounty award program in April 2016 to find bugs

Usernames and passwords of registrants compromised but financial information of subscribers believed to be safe. The popular science news journal site EurekAlert, is down after a major breach saw hackers leak embargoed news releases and studies on Twitter. EurekAlert said

Cisco has released software updates for its WebEx Meetings Server product to address a couple of critical and high severity vulnerabilities that can be exploited remotely for arbitrary command execution and denial-of-service (DoS) attacks. The critical flaw, tracked as CVE-2016-1482,

Do you own an Android Smartphone from Xiaomi, HTC, Samsung, or OnePlus? If yes, then you must be aware that almost all smartphone manufacturers provide custom ROMs like CyanogenMod, Paranoid Android, MIUI and others with some pre-loaded themes and applications

Adobe announced on Tuesday that security updates released for Flash Player, Digital Editions and Adobe Air SDK & Compiler patch a total of 37 vulnerabilities. According to Adobe, Flash Player versions prior to 23.0.0.162 and 18.0.0.375 are affected by 27

A ‘booter’ service designed to simplify DDoS attacks has been hacked and the details of its paying customers revealed, it has emerged. Researcher Brian Krebs revealed the news in a blog post, claiming the vDOS tool had made its Israeli

Distributed denial of service (DDoS) attacks are on the rise, even as attack volume falls. Total DDoS attacks increased 129 percent in Q2 2016 from Q2 2015, and during the second quarter, Akamai mitigated a total of 4,919 DDoS attacks.

Apple isn’t the only one offering up a $200,000 reward for severe vulnerabilities on mobile devices. Google followed suit yesterday with the announcement of the Project Zero Prize, and like the Apple Security Bounty, the top payout is $200,000. Announced

The old “Macs don’t get viruses” chestnut hasn’t been true for years, if it ever was. But Apple aficionados can take a small measure of comfort in the fact when they’re under attack by malware, they’re often not alone. The

A Windows Trojan called DualToy has been discovered that can side load malicious apps onto Android and iOS devices via a USB connection from an infected computer. Researchers from Palo Alto Networks said DualToy has been in existence since January

The official website of Republican presidential candidate and serial twitterer Donald Trump leaked the resumes of more than twenty aspiring interns. The resumes were stored in an insecure Amazon cloud server that was accessible for anyone who knew where to

Seagate HR fell for a phishing scam and released sensitive employee data. The staff affected by the disaster want compensation.  Seagate is trying to fend off a lawsuit brought against the company by its own employees after falling for a

Unhashed passwords, email addresses, and reams of personal data are now reportedly up for sale. ClixSense has become the victim of a cyberattack which has led to the data of millions of users being put up for sale. This week,

If you are looking for ways to run a malware simulator to test ransomware and other forms of malware in your environment, but don’t want to deal with the actual materials to infect your systems, look no further than the

Cisco disclosed the existence of the CVE-2016-6399 flaw that can be exploited by remote unauthenticated attackers to trigger DoS conditions in ACE products. Experts at Cisco have disclosed the existence of a high-severity vulnerability, tracked as CVE-2016-6399, that can be

Google’s been pushing toward all-HTTPS for a while now. In March 2014, during the unveiling of the ever-widening NSA/GCHQ/FBI/et al surveillance state, Google started using an always-on HTTPS connection and encrypting all Gmail messages moving internally on its servers. At