Uber Announces Bug Bounty Program, Rewards Can Go Up to $10,000

Uber Announces Bug Bounty Program, Rewards Can Go Up to $10,000

The program's first round will start on May 1, 2016

US Government Preparing Bill to Make Car Hacking Research Illegal

US Government Preparing Bill to Make Car Hacking Research Illegal

Car maker lobbying groups show their might

One in 600 Websites Lists Its .git Folder, Exposing Sensitive Data

One in 600 Websites Lists Its .git Folder, Exposing Sensitive Data

Unprotected .git folders can leak sensitive information

Reward for Internet Defense Prize Grows to $300,000

Reward for Internet Defense Prize Grows to $300,000

Money intended to put research idea into practice

XSS Vulnerability Affected Comments Section of Hundreds of Yahoo Pages

XSS Vulnerability Affected Comments Section of Hundreds of Yahoo Pages

Yahoo addressed the issue a few days after learning of its existence

Filenames Used by VOBFUS Malware Change Depending on Victim’s Language

Filenames Used by VOBFUS Malware Change Depending on Victim’s Language

The latest version of the worm can “speak” a total of 21 languages

Fake Kaspersky Apps Discovered on Windows Phone Store and Google Play

Fake Kaspersky Apps Discovered on Windows Phone Store and Google Play

Scammers are selling bogus apps disguised as popular pieces of software

Experts Advise Estonia to Stop Using Its E-Voting System Due to Security Concerns

Experts Advise Estonia to Stop Using Its E-Voting System Due to Security Concerns

The system is vulnerable to cyberattacks by Russia and other entities

Ajax Security Team: The Evolution of Iranian Hackers from Defacements to Espionage

Ajax Security Team: The Evolution of Iranian Hackers from Defacements to Espionage

FireEye has published a report on Operation Saffron Rose

Arbor Networks Details POS Malware in Latest 2014 Threat Intelligence Brief

Arbor Networks Details POS Malware in Latest 2014 Threat Intelligence Brief

The Arbor Security Engineering & Response Team has compiled the 2014-6 report

Cybercriminals Use Microsoft Word Flaw in Attacks Targeted at Taiwanese Government

Cybercriminals Use Microsoft Word Flaw in Attacks Targeted at Taiwanese Government

Trend Micro researchers have investigated the attacks

Cybercriminals Use Viknok Trojan to Make Money via Click Fraud

Cybercriminals Use Viknok Trojan to Make Money via Click Fraud

Symantec experts spotted 22,000 unique infections in April

German Security Expert Finds Vulnerabilities on the NSA’s Website

German Security Expert Finds Vulnerabilities on the NSA’s Website

The intelligence agency has patched the vulnerabilities

“Covert Redirect” OAuth Security Flaw Not as Serious as It Sounds, Experts Say

“Covert Redirect” OAuth Security Flaw Not as Serious as It Sounds, Experts Say

User interaction is required and an open redirect must exist for the attack to work

Samsapo Android Malware Spreads like a Computer Worm

Samsapo Android Malware Spreads like a Computer Worm

For the time being, the threat only targets Russian users

Customers of US Banks Targeted in Vishing Attacks

Customers of US Banks Targeted in Vishing Attacks

PhishLabs has been monitoring a group that has harvested the details for 250 cards per day

Sensors Used for Traffic Control Systems Can Be Hacked, Experts Warn

Sensors Used for Traffic Control Systems Can Be Hacked, Experts Warn

Communications are not encrypted, exposing data to interception

 
Want more? Browse: