CyberCrime

Iran Removes Malware From Petrochemical Plants – Report

Iran takes 'necessary defensive measures' after malware is discovered at two of its petrochemical plants

8 years ago

Apple Patches iPhone Spyware Vulnerabilities With iOS 9.3.5

I spy with my little iPhone! Apple rushes out iPhone patch after discovery of government spying hack

8 years ago

Researchers Warn Of ‘Epidemic’ Money-Flipping Malware On Instagram

Bank followers on Instagram beware of money-flipping 'epidemic', but photo-sharing platform says scams are "low volume"

8 years ago

Universities Plagued By Ransomware Attacks

Yet only one university contacted the police about their attack, as criminals demand as much as £2,200

8 years ago

Security Researchers Discover First Twitter-Controlled Botnet

Twitoor, uncovered by ESET, can plague Android devices with malicious malware

8 years ago

UK Continues To Be Battered By DDoS Attacks

DDoS attacks increase by over 200 percent, with the UK the second most targeted nation

8 years ago

Twitter Pulls The Plug On More Terrorist Accounts

Twitter suspends 360,000 accounts for 'promotion of terrorism', but warns there is no magic algorithm to ID suspects

8 years ago

Sage Employee Arrested At Heathrow Airport

Just days after damaging data breach at Sage, police confirm arrest of staffer at Heathrow airport

8 years ago

Linux Networking Flaw Allows Attacker To Trick Safety Mechanism

A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?

8 years ago

Tor Network Makes ‘Do No Harm’ Pact With Users In Social Contract

Keeping it open source baby. Tor Social Contract promises no backdoors and complete honesty with its users

8 years ago

Linux Trojan Written In Go Mines For Cryptocurrencies

'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software

8 years ago

Instagram Hack Promotes Porn Spam And Adult Dating

Symantec warns of Instagram profile hack that uses compromised accounts to promote adult dating websites

8 years ago

FTC Commissioner Looking For Hackers’ Help With Consumer Privacy

FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…

8 years ago

Windows 10 Linux Feature Brings Real, But Manageable Security Risks

ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…

8 years ago

Rio 2016: Zeus Panda Banking Trojan Arrives in Brazil

Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games

8 years ago

State Of Ransomware: More Than Half Of UK Firms Are Victims

Crippling threat...20 percent of firms hit by ransomware had to cease business operations

8 years ago

Rio 2016: Social Media Scams And 4,500 Malicious Apps Target Olympic Fans

RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…

8 years ago

Experiment Finds Half Of ‘Lost’ USB Sticks Will Be Plugged In

BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…

8 years ago

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…

8 years ago

ATM Hack Gives Attackers Cash And Account Data

BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures

8 years ago

Bitcoin Confidence Takes A Hit As Heist Nets Criminals £54m

Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack

8 years ago

Researchers Discover Major HTTP/2 Flaws

Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution

8 years ago

Kaspersky Lab Creates Bug Bounty Program

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

8 years ago

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

BT Security CEO: We’ve Learned The Lessons From TalkTalk Hack

INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…

8 years ago

AdGholas Malvertising Campaign Closes After Proofpoint Discovery

AdGholas malvertising campaign closes after pulling in at least a million victim computers a day

8 years ago

Cyber Attack Uses Google Drive To Deliver 9002 Trojan

Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries

8 years ago

KeySniffer Flaw Exposes Wireless Keyboard Typing

Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away

8 years ago

Cisco: Ransomware Is Only Going To Get Worse

Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report

8 years ago