Italy and Spain Targeted with Ransomware

Traffic coming from other countries is redirected to Google

Researchers Crack Rombertik’s Anti-Cracking Feature

Anti-piracy craking keys available in malware's binary code

Popular SSH Client PuTTY Gets New Version That Steals Credentials

Malicious PuTTY delivered via compromised download locations

Google Image Search Can Be Used to Identify Fake Social Media Profiles

Some scammers use publicly available pics for their profiles

Address Bar Spoofing Vulnerability Affects Chrome for Android Updated

Attackers could still try to leverage the flaw

URL Spoofing in Safari Opens Door for Phishing Attacks

Flaw can be exploited on the latest versions of iOS and OS X

Researcher Hacked Airplane Controls Mid-Flight, FBI Affidavit Reveals

Chris Roberts admits to in-flight hacking, context not clear

Researchers Break RSA 4096-Bit Keys, but Don't Worry Yet

It's no disaster, RSA cryptosystem is still strong

Mobile Spyware Database Pops Up on the Dark Web, over 400,000 Impacted

Company rejects breach allegations, says data is 100% safe

Fraud Ring Claims $7.5 Million in IRS Refunds, Woman Gets Arrested

Over 3,000 false tax returns were filed in 2012 and 2013

 
Want more? Browse: