SQL Injection Vulnerability on Tesla Motors’ Website Exposed Customer Records

SQL Injection Vulnerability on Tesla Motors’ Website Exposed Customer Records

The security hole was fixed shortly after being reported

Cybercriminals Are Adapting Ransomware Tactics to Local Markets

Cybercriminals Are Adapting Ransomware Tactics to Local Markets

Trend Micro researchers have analyzed attacks aimed at users in Turkey and Hungary

Experts Find WhatsApp Vulnerabilities That “the NSA Would Love”

Experts Find WhatsApp Vulnerabilities That “the NSA Would Love”

Fortunately, the company rushed to address most of the issues

Cybercriminals Trick Mobile Users into Paying $5 / €3.6 for Flash Player

Cybercriminals Trick Mobile Users into Paying $5 / €3.6 for Flash Player

The scheme is powered by a piece of malware designed to target Android users

Leak of iBanking Bot Source Code Opens Up New Opportunities for Cybercriminals

Leak of iBanking Bot Source Code Opens Up New Opportunities for Cybercriminals

RSA researchers have found the source code on a forum

Mistake Made by BitCrypt Developers Allows Experts to Recover Encrypted Files

Mistake Made by BitCrypt Developers Allows Experts to Recover Encrypted Files

Not all ransomware is as unbreakable as CryptoLocker

Flaw in Tinder Dating App Allowed Hackers to Determine the Exact Location of Any User

Flaw in Tinder Dating App Allowed Hackers to Determine the Exact Location of Any User

Researchers from Include Security are the ones who found and reported the vulnerability

Operation GreedyWonk: Flash Zero-Day Used in Attack on Visitors of Foreign Policy Sites

Operation GreedyWonk: Flash Zero-Day Used in Attack on Visitors of Foreign Policy Sites

Security researchers from FireEye have analyzed the campaign

Internet Bug Bounty Pays First $10,000 / €7,300 Reward for Adobe Flash Vulnerability

Internet Bug Bounty Pays First $10,000 / €7,300 Reward for Adobe Flash Vulnerability

The researcher who got the reward isn’t the one who discovered the security hole

Shodan Introduces Shodan Maps Add-on

Shodan Introduces Shodan Maps Add-on

Users have to pay a $19 (€13.8) one-time fee to get the new add-on

Experts Discover New ZeuS Variant Designed to Target Salesforce.com Customers

Experts Discover New ZeuS Variant Designed to Target Salesforce.com Customers

Security researchers from Adallom have analyzed the new type of attack

XSS Vulnerability Found in WikiLeaks’ Internal Search Engine

XSS Vulnerability Found in WikiLeaks’ Internal Search Engine

The security hole was addressed within hours after being discovered

Two Different Cybercriminal Groups Are Using IE 10 Zero-Day in Their Operations

Two Different Cybercriminal Groups Are Using IE 10 Zero-Day in Their Operations

Researchers from Seculert have reached a different conclusion than ones from Websense

Over 500,000 Belkin WeMo Home Automation Devices Vulnerable to Hacker Attacks

Over 500,000 Belkin WeMo Home Automation Devices Vulnerable to Hacker Attacks

Security researchers from IOActive have analyzed the devices

ZeuS Trojan Configuration File Disguised as Harmless Image

ZeuS Trojan Configuration File Disguised as Harmless Image

Cybercriminals use steganography to make sure the original file is not damaged

Linksys Is Preparing Firmware Fix to Protect Users Against “TheMoon” Worm

Linksys Is Preparing Firmware Fix to Protect Users Against “TheMoon” Worm

A proof-of-concept exploit has been published online

Kaspersky Says Computrace Is Vulnerable, Absolute Software Denies Accusations

Kaspersky Says Computrace Is Vulnerable, Absolute Software Denies Accusations

Experts say the tool can be a powerful weapon for cybercriminals

 
Want more? Browse: