Archive

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical vulnerability. SAP POS is client-server technology that belongs to the SAP for Retail line-up, it is widely adopted, it has

A PIN password might seem like a secure way to lock a device but, considering how easy it is for a stranger to peak over your shoulder, it might not be that all that secure. Soon, an app called IllusionPIN

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails sent by hackers — and fewer than one-in-10 switch it on, according to a new survey. The survey, carried out

Microsoft researchers detected a 300% increase in user accounts attacked over the past year, and 44% growth in the number of account sign-ins attempted from malicious IP addresses. The data comes from Microsoft’s latest Security Intelligence Report (SIR) released today

Google recently deleted around 300 apps from the official Play Store which were used to create what is being called one of the first Android botnets. Known by the name WireX, it included around 120,000 IP addresses across 100 different

On Monday, Google released the long-awaited Android 8.0 Oreo. The newest version of the OS contains many new features and behavior changes, as well as many security improvements and security-related changes. With Android 8.0 Oreo, the platform no longer supports

BeyondTrust, the leading cyber security company dedicated to preventing privilege abuse and stopping unauthorized access, announced that for the fourth straight year, it is listed as a Representative Vendor in Gartner’s August 2017 Market Guide for Privileged Access Management (PAM).

Ethereum and ICOs – the hackers keep getting rich. On Sunday, hackers stole nearly $500,000 in Ethereum from Enigma, a cryptocurrency investment platform provider that was preparing to raise money through an initial coin offering. The hackers took control of

A security flaw that could affect millions of cars has been identified, with researchers warning that there may be no fix available to protect susceptible vehicles. The exploit works by overloading the so-called CAN, or “car device network”, which connects

According to recent Proofpoint research, eight extensions for the Google Chrome web browser have been compromised by attackers, sending malicious ads to the affected users. In a report, Proofpoint explained that the authors of these extensions had their credentials stolen,

A new modification of notorious mobile banking Trojan “Faketoken” has resurfaced which is able to steal credentials from popular taxi applications and ride-sharing apps, Moscow-based cybersecurity firm Kaspersky Lab said on Friday. “The new version of ‘Faketoken’ performs live tracking

Researchers have discovered that cyber attackers are exploiting a vulnerability that allows them to elude antivirus software to deliver malware via Microsoft PowerPoint. The flaw itself exists in the Windows Object Linking and Embedding (OLE) interface and attackers have previously

Two critical zero-day vulnerabilities have been detected in the Foxit Reader software that could allow attackers to execute arbitrary code on the target computer, if the software is not configured to open files in the reading mode. the first vulnerability

Malware has threatened computers, networks, and infrastructures since the eighties. There are two major technologies to defend against this, but most organizations rely almost exclusively on just one approach, the decade’s old signature-based methodology. The more advanced method of detecting

In 2016, Linux turned 25. When it began, it was a student project. Today, Linux runs everything. From smartphones to supercomputers to web servers to clouds to the car, it’s all Linux, all the time. Even the one exception, the

A variant of an old adware for Mac was recently discovered, and has sneakily found a way to circumnavigate security platforms by Apple. Dubbed ‘Mughthesec,’ the program is an improved version of the OperatorMac malware family, according to Thomas Reed,