RFID-Based Master Key Cards Can Be Hacked, Experts Warn

RFID-Based Master Key Cards Can Be Hacked, Experts Warn

It's not that difficult to open the door to your apartment building

Vulnerabilities in SD Cards Can Be Exploited for MITM Attacks

Vulnerabilities in SD Cards Can Be Exploited for MITM Attacks

Researchers have presented their findings at 30C3

Researchers Find Critical Vulnerability in Samsung Knox

Researchers Find Critical Vulnerability in Samsung Knox

The flaw can be leveraged to bypass the protection provided by the secure container

FeedBurner.com Page Set Up to Serve JavaScript Trojan

FeedBurner.com Page Set Up to Serve JavaScript Trojan

Cybercriminals are abusing the Google feed management service

Cybercriminals Abuse Network Time Protocol for DDOS Attacks

Cybercriminals Abuse Network Time Protocol for DDOS Attacks

Symantec researchers have spotted an increase in the number of such attacks

Possible Owner of Service Selling Target Payment Card Data Identified

Possible Owner of Service Selling Target Payment Card Data Identified

He appears to be a Ukrainian named Andrey Hodirevski

Syrian Government Supporters Target Journalists, NGOs and Opposition with Malware

Syrian Government Supporters Target Journalists, NGOs and Opposition with Malware

A new research paper published by the EFF and Citizen Lab

CryptoLocker 2.0 Appears to Be the Work of Copycats

CryptoLocker 2.0 Appears to Be the Work of Copycats

ESET researchers have analyzed the new file-encrypting malware

Trojan.Ferret: New DDOS Malware Likely Developed by Russians

Trojan.Ferret: New DDOS Malware Likely Developed by Russians

Arbor Networks researchers have analyzed the threat

Full 4096-Bit RSA Keys Extracted by Listening to the Sound Made by Computers

Full 4096-Bit RSA Keys Extracted by Listening to the Sound Made by Computers

Experts have tested their attack against GNU Privacy Guard

ZeuS Trojan Variant Targets Accounts of BTC China Customers

ZeuS Trojan Variant Targets Accounts of BTC China Customers

Trusteer researchers have analyzed the Gameover malware

Experts Analyzed DGA.Changer Malware Served in PHP.net Attack

Experts Analyzed DGA.Changer Malware Served in PHP.net Attack

Seculert says the threat is mainly designed to download other pieces of malware

Qadars Banking Trojan Targets Users from the Netherlands

Qadars Banking Trojan Targets Users from the Netherlands

The threat uses web injects and Android modules to steal sensitive information

ChewBacca: Infostealer Malware Uses Tor for C&C Infrastructure

ChewBacca: Infostealer Malware Uses Tor for C&C Infrastructure

Kaspersky researchers say the Trojan is not sold publicly

Skimmer Trojan Targets ATMs Made by One of the World’s Largest Manufacturers

Skimmer Trojan Targets ATMs Made by One of the World’s Largest Manufacturers

Doctor Web researchers have analyzed the new threat

CERT Poland Warns of DDOS Botnet Targeting Windows and Linux Machines

CERT Poland Warns of DDOS Botnet Targeting Windows and Linux Machines

Linux machines are likely targeted because they're usually servers with a lot of bandwidth

Browlock Cybercriminals Use Malvertising to Lure Victims to Malicious Site

Browlock Cybercriminals Use Malvertising to Lure Victims to Malicious Site

Symantec has blocked 650,000 connections in November

 
Want more? Browse: