Security

100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics
NEWS
100 new ransomware families ID'd in 2015, as campaigns adopt APT tactics
In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.
 
Lurk banking Trojan propagated via 'legitimate' software
NEWS
Lurk banking Trojan propagated via 'legitimate' software
Kaspersky researchers have spotted the Lurk banking Trojan lurking around as legitimate pieces of software on Ammyy.com
 
Ransomware writers adopt cloud services
NEWS
Ransomware writers adopt cloud services
Cyber-criminals have noticed the lucrative opportunities for wrong-doing in leveraging cloud services and evolved new techniques to their benefit.
DARPA competition looks to AI to be cybercrooks 
NEWS

DARPA competition looks to AI to be cybercrooks

DARPA are starting a competition to help automate defence and see how artificial intelligence can combat cyber-threats.
Pokémon Go service downed, DDoSers rush to claim glory 
NEWS

Pokémon Go service downed, DDoSers rush to claim glory

Two separate groups are claiming responsibility for a supposed DDoS attack on Pokemon Go servers. Pokemon Go's developers say that it's merely too popular.
New banking malware stops customers from cancelling payment cards 
NEWS

New banking malware stops customers from cancelling payment cards

Symantec has spotted a new banking malware that stops a victim from cancelling a compromised payment card by blocking calls from the infected device to the bank's customer service department.
After Tor exploit, researchers develop new anonymity network 
NEWS

After Tor exploit, researchers develop new anonymity network

A team of researchers has created an anonymity network methodology that they believe is more efficient and more secure than existing anonymous networks such as Tor.
Phishing: What makes people click?  
NEWS

Phishing: What makes people click?

Dr Jules Pagna Disso explains why remains one of the most successful forms of attack, and why staff education is key to tackling the problem.
A 20 year old Windows security weak spot has just been patched 
NEWS

A 20 year old Windows security weak spot has just been patched

Hackers have been able to infect networks with evil printers for two decades
Researchers claim to discover cure for the common ransomware 
NEWS

Researchers claim to discover cure for the common ransomware

By analysing changes in files, security researchers believe they have discovered a way to detect ransomware in the early stages of encrypting your data.
Hidden voice commands could hijack smartphones 
NEWS

Hidden voice commands could hijack smartphones

Borg-like voice commands from your phone could take control of nearby Android devices using a newly demonstrated voice recognition vulnerability.
Eleanor Mac malware opens Tor connection for attackers to spy on and control Macs 
NEWS

Eleanor Mac malware opens Tor connection for attackers to spy on and control Macs

A newly discovered malware capable of cyberespionage and remote takeover is targeting Mac computers, delivering its payload by opening up a backdoor connection to a command-and-control web server via the encrypted Tor network.
Phishing scam targets those with Brexit anxiety 
NEWS

Phishing scam targets those with Brexit anxiety

A cyber-scam has been unfolding in the wake of the Brexit vote.
10,000 Facebook users infected by malware 
NEWS

10,000 Facebook users infected by malware

A message seeming to come from a Facebook friend was instead a source of malware that ensnared 10,000 users.
Flaws in Android full disk encryption revealed 
NEWS

Flaws in Android full disk encryption revealed

An Israeli university student has found flaws in Android, which would allow a brute force attack to crack the full disk encryption
LizardStresser botnets using webcams, IoT gadgets to launch DDoS attacks 
NEWS

LizardStresser botnets using webcams, IoT gadgets to launch DDoS attacks

Lizard Squad's LizardStresser botnet rising in popularity as hackers and cyber-criminals increasingly look to it as a way of assimilating IoT devices for later DDoS attacks.
World-Check due diligence list leaked online, Thomson-Reuters admits 
NEWS

World-Check due diligence list leaked online, Thomson-Reuters admits

A list of people suspected of links with crime and terrorism from due diligence company World-Check has been leaked online, reportedly by a former associate.
OurMine hackers take Uber CEO's Twitter page for a joyride 
NEWS

OurMine hackers take Uber CEO's Twitter page for a joyride

Last night, Uber CEO Travis Kalanick became the latest public target of the OurMine hacking group, which posted an unauthorized message on his Twitter page, likely after hijacking his linked Quora account.
The security evolution that could kill antivirus 
NEWS

The security evolution that could kill antivirus

We've become accustomed to relying on antivirus, but the Internet of Things is set to hasten its demise - or at least help it lighten up.
Mozilla uses emoji to teach you the basics of encryption 
NEWS

Mozilla uses emoji to teach you the basics of encryption

Codemoji aims to introduce users to ciphers using emoji.
Page 1 of 65 1 2 3 4 5 ...65

Latest Comments

From our Partners

PC & Tech Authority Downloads