• Security
  • By Catalin Cimpanu
  • September 3rd, 2016
USBee Malware Turns Regular USB Connectors into Data-Stealing Weapons

USBee Malware Turns Regular USB Connectors into Data-Stealing Weapons

USBee attack inspired by NSA's COTTONMOUTH cyber-weapon

Intruders Use Virtual Machines on Infected PCs to Hide Their Actions

Intruders Use Virtual Machines on Infected PCs to Hide Their Actions

SecureWorks observes new technique used by threat actors

Malware Can Use Fan Noise to Exfiltrate Data from Air-Gapped Systems

Malware Can Use Fan Noise to Exfiltrate Data from Air-Gapped Systems

Attack works up to a distance of four meters

Infographic: The Anatomy of a Data Breach

Infographic: The Anatomy of a Data Breach

On average, data breaches cost companies $3.79 million

Siri’s Voice Could Carry Sensitive Info to an Attacker

Siri’s Voice Could Carry Sensitive Info to an Attacker

Researchers draw attention to steganography-based attacks

Apple iOS Laced with Undocumented Data Exfiltration Services

Apple iOS Laced with Undocumented Data Exfiltration Services

Surveillance components available on about 600 million iOS devices