• Security
  • By Catalin Cimpanu
  • February 2nd, 2016
Compromised WordPress Sites Hijacked Over and Over Again to Push Malware

Compromised WordPress Sites Hijacked Over and Over Again to Push Malware

Attacker is using an unknown backdoor to reinfect websites

Linux Trojan That Takes Screenshots and Records Audio Has a Windows Brother

Linux Trojan That Takes Screenshots and Records Audio Has a Windows Brother

A Mac OS X version is also theoretically possible

  • Security
  • By Catalin Cimpanu
  • January 26th, 2016
US Agencies Have 2 Weeks to Report If They Were Affected by the Juniper Backdoor

US Agencies Have 2 Weeks to Report If They Were Affected by the Juniper Backdoor

US Government starts nationwide Juniper equipment audit

Simple Yet Efficient Linux Backdoor Trojan Discovered

Simple Yet Efficient Linux Backdoor Trojan Discovered

Linux.BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine

AT&T CEO Claims Microsoft, Apple Shouldn’t Have a Word to Say in US Backdoor Debate

AT&T CEO Claims Microsoft, Apple Shouldn’t Have a Word to Say in US Backdoor Debate

The Congress should be the one to decide, he says

  • Security
  • By Catalin Cimpanu
  • January 22nd, 2016
Chinese Group Trying to Exploit Old Fortinet SSH Backdoor

Chinese Group Trying to Exploit Old Fortinet SSH Backdoor

Scans for Fortinet devices have intensified

  • Security
  • By Catalin Cimpanu
  • January 22nd, 2016
British Government Has Already Created a Data Encryption Protocol Complete with a Backdoor

British Government Has Already Created a Data Encryption Protocol Complete with a Backdoor

GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG

  • Security
  • By Catalin Cimpanu
  • January 21st, 2016
Fraud Campaign Uses RATs Against Companies in US, UK, and India

Fraud Campaign Uses RATs Against Companies in US, UK, and India

Crooks were using Backdoor.Breut and Trojan.Nancrat RATs

  • Security
  • By Catalin Cimpanu
  • January 21st, 2016
Backdoor Account Found on Devices Used by White House, US Military

Backdoor Account Found on Devices Used by White House, US Military

The backdoor accounts were named Black Widow and Batman

  • Security
  • By Catalin Cimpanu
  • January 14th, 2016
Cisco Removes Backdoor from Some of Its Access Points

Cisco Removes Backdoor from Some of Its Access Points

After Juniper and Fortinet, Cisco now also joins the "we use hardcoded credentials in our firmware" club

  • Security
  • By Catalin Cimpanu
  • January 12th, 2016
SSH Backdoor Identified in Fortinet Firewalls

SSH Backdoor Identified in Fortinet Firewalls

Fortinet pulls a Juniper on its customers

Google, Microsoft, Facebook, Desperately Urge UK to Reconsider Encryption Backdoors

Google, Microsoft, Facebook, Desperately Urge UK to Reconsider Encryption Backdoors

Five Silicon Valley tech companies would like a little bit more clarity in the words used for UK's IPB

  • Security
  • By Catalin Cimpanu
  • December 23rd, 2015
Hackers Are Already Using the Secret Juniper Firewall Backdoor in Their Attacks

Hackers Are Already Using the Secret Juniper Firewall Backdoor in Their Attacks

Honeypot experiment shows growing interest from attackers in vulnerable Juniper NetScreen firewall equipment

  • Security
  • By Catalin Cimpanu
  • December 22nd, 2015
Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors

Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors

Cisco adopts a "better safe than sorry" mentality, announces that it will start looking for backdoors on its own

Security Firm Discovers Backdoor Password for Juniper ScreenOS Devices

Security Firm Discovers Backdoor Password for Juniper ScreenOS Devices

Password string was made to look like debug code

  • Security
  • By Catalin Cimpanu
  • December 16th, 2015
FireEye Security Devices Provide Attackers with Backdoor into Corporate Networks

FireEye Security Devices Provide Attackers with Backdoor into Corporate Networks

FireEye security equipment can be compromised, Google finds

Latentbot Is the Next Step in Evolution for Stealthy Backdoors

Latentbot Is the Next Step in Evolution for Stealthy Backdoors

Backdoor bot manages to remain hidden for two years

 
Want more? Browse: