Archive

A hacker group called Cobalt targeted ATMs across Europe in “smash and grab” operations. The hackers are reported to have remotely attacked ATMs using malicious software, which manipulated the systems to dispense cash. Two of the biggest global ATM manufacturers,

Security researchers have uncovered over 1,700 fake accounts on Instagram created by the Linux/Moose botnet. Hackers have created thousands of fake accounts on popular social media platforms like Instagram, Twitter, YouTube and Periscope, via an IoT botnet, using the Linux/Moose

Customers of food delivery service Deliveroo have had their accounts compromised and were charged hundreds of pounds for food they did not order, an investigation by BBC One’s Watchdog has found. Hackers allegedly used stolen passwords swiped in earlier data

Smishing is nothing new. We’ve been warning readers of We Live Security about SMS phishing attacks (also known sometimes as SMSishing) for years. But even if they’re not new, they continue to pose a threat to many smartphone owners and

The financial repercussions of a data breach have been highlighted by the $1 million fine handed out to Adobe Systems for a 2013 security incident. Roy Cooper, attorney general of North Carolina, said that businesses and government “must do more”

Juniper Networks has announced two new firewalls in its SRX line with throughput up to 40Gbps. The company also announced Policy Enforcer, software that can push security policies to access switches to block or quarantine compromised hosts. The products were

The Bangladesh central bank has reportedly retrieved $15.25m (£12.2m) of the $81m stolen in an unprecedented cyberattack against the financial institution in February. Officials who are now working to retrieve more of the funds believe at least $30m more could

Computer scientists at Yale University in the US have developed the world’s first super-secure computer operating system running on multi-core processors. It aims to keep hackers out and shield against cyberattacks by reengineering the way computers are traditionally built. The

Numerous low-cost Android phones are believed to come with a secret backdoor, which was found to have sent massive amounts of user data to China. The Chinese firm Shanghai Adups Technology Company was found to have intentionally pre-loaded phones with

  US and Chinese security researchers have discovered that it is possible to detect a user’s private information by studying the radio signals emitted to provide Wi-Fi internet coverage and how they interact with a person’s body movements. Researchers from

Tesco Bank halted all online transactions after a cyber heist affected thousands of its customers. An investigation is ongoing. Tesco Bank is going to adopt a strong measure in response to a cyber attack, the financial institution will freeze customers’

Cyber-criminals are hell bent on exploiting hospitals for fulfilling their malicious desires probably because hospitals have proven to be easy targets. Recently we have seen numerous hospitals being victimized through cyber-attacks. In the latest of their attempts, nefarious cyber-criminals shut

It is a well-known fact that Google loves to give novice programmers, white hat hackers and security researchers an opportunity to prove their skills and capabilities by participating in Google’s Vulnerability Reward program. Google invites researchers from all across the

The Shadow Brokers – a mysterious entity that previously leaked a number of computer exploits used by hackers linked with the National Security Agency (NSA) – has released a fresh cache of data believed to be hundreds of IP addresses