Cybercriminals Hijack Internet Connections by Changing DNS Settings in Routers

Cybercriminals Hijack Internet Connections by Changing DNS Settings in Routers

300,000 home and small office routers have already been compromised

Flaw in Yahoo! Suggestions Allowed Hackers to Delete 1.5 Million Posts and Comments

Flaw in Yahoo! Suggestions Allowed Hackers to Delete 1.5 Million Posts and Comments

The security researcher who uncovered the vulnerability has published a POC video

Uroburos: Espionage Rootkit Allegedly Created by Russian Intelligence Agency

Uroburos: Espionage Rootkit Allegedly Created by Russian Intelligence Agency

Security researchers from G Data are the ones who uncovered the threat

Sochi Olympics-Themed Malware Emails Reference Terrorism and Military Cooperation

Sochi Olympics-Themed Malware Emails Reference Terrorism and Military Cooperation

Symantec has analyzed some of the targeted attacks

Gameover Borrows Kernel-Mode Rootkit from Necurs Malware

Gameover Borrows Kernel-Mode Rootkit from Necurs Malware

Security researchers from Sophos have analyzed the new version

Experts Find Vulnerabilities in RSA Conference 2014 Android Application

Experts Find Vulnerabilities in RSA Conference 2014 Android Application

The names, companies and titles of all registered users are exposed

1,208 Vulnerabilities Discovered in the 50 Most Popular Applications in 2013

1,208 Vulnerabilities Discovered in the 50 Most Popular Applications in 2013

The Secunia Vulnerability Review 2014 has been made available

Fake “Payment Certificate” Notifications Used to Deliver Cross-Platform RAT

Fake “Payment Certificate” Notifications Used to Deliver Cross-Platform RAT

Security experts from Symantec say users in the UK and the UAE are targeted

Flaws in Amazon’s Mobile Apps Could Have Been Exploited to Crack Passwords

Flaws in Amazon’s Mobile Apps Could Have Been Exploited to Crack Passwords

Amazon has addressed the security holes in its iOS and Android apps

Tilon Malware Was a Side Project of SpyEye Author, Researchers Say

Tilon Malware Was a Side Project of SpyEye Author, Researchers Say

Fox-IT has investigated Tilon after the guilty plea of Aleksandr Andreevich Panin

Viruses Can Spread via Wi-Fi Access Points like the Common Cold, Researchers Show

Viruses Can Spread via Wi-Fi Access Points like the Common Cold, Researchers Show

An experiment has been performed with the Chameleon virus

Bitcoin-Stealing Mac Malware Disguised as Angry Birds Game

Bitcoin-Stealing Mac Malware Disguised as Angry Birds Game

OSX/CoinThief is being distributed via torrent websites

Fresh Stash of 360 Million Credentials and 1.25 Billion Email Addresses Uncovered

Fresh Stash of 360 Million Credentials and 1.25 Billion Email Addresses Uncovered

The data has been stolen from various organizations

Cybercriminals Use Pony Botnet to Steal 700,000 Account Credentials, Virtual Currencies

Cybercriminals Use Pony Botnet to Steal 700,000 Account Credentials, Virtual Currencies

Researchers from SpiderLabs say most of the data has been stolen from European users

Experts Find Vulnerabilities in Microsoft’s EMET

Experts Find Vulnerabilities in Microsoft’s EMET

The protections offered in the free tool can be bypassed, researchers warn

Backdoor.AndroidOS.Torec.a: First Tor-Based Trojan for Android

Backdoor.AndroidOS.Torec.a: First Tor-Based Trojan for Android

Researchers from Kaspersky have spotted the new threat

Banking Malware Distributed via YouTube Ads

Banking Malware Distributed via YouTube Ads

Bromium researchers are working with Google to determine how this may have happened

 
Want more? Browse: