Expert Finds 23 Security Holes in Schneider, Rockwell, Other SCADA Systems

Expert Finds 23 Security Holes in Schneider, Rockwell, Other SCADA Systems

Researchers claim that many SCADA vulnerabilities are easy to find

Database-Destroying Narilam Malware Almost Extinct, Experts Say

Database-Destroying Narilam Malware Almost Extinct, Experts Say

Researchers haven't been able to find any links to Stuxnet, Duqu, Flame or Gauss

Numerous .eu Domains Registered to Host BlackHole Exploit Kit

Numerous .eu Domains Registered to Host BlackHole Exploit Kit

The cybercriminals are using a server located in the Czech Republic

Narilam Worm Targets Corporate Databases from the Middle East

Narilam Worm Targets Corporate Databases from the Middle East

The malware is designed to modify and remove certain items

Experts Find Way to Crack Default WPA2 Passwords of Belkin Routers

Experts Find Way to Crack Default WPA2 Passwords of Belkin Routers

The company hasn't collaborated with the researchers in addressing the issue

Password-Stealing Malware Passteal Distributed via File Sharing Sites

Password-Stealing Malware Passteal Distributed via File Sharing Sites

A new variant has been found to rely on WebBrowserPassView to access sensitive data

Operation High Roller: Cybercriminals Target European SEPA Network

Operation High Roller: Cybercriminals Target European SEPA Network

McAfee researchers have analyzed the latest attacks targeting German banks

Security Predictions for 2013 Provided from Three Different Angles

Security Predictions for 2013 Provided from Three Different Angles

Experts from GlobalSign, Solutionary and SpectorSoft share some insight

Linux Rootkit, Perfect for Targeted Attacks and Drive-by Download Scenarios, Found

Linux Rootkit, Perfect for Targeted Attacks and Drive-by Download Scenarios, Found

Experts from Kaspersky and CrowdStrike have analyzed the new threat

Even Small and Unimportant Security Bugs Matter in Java, Experts Say

Even Small and Unimportant Security Bugs Matter in Java, Experts Say

Security Explorations has released an interesting technical report on Java SE security

Experts Find Ransomware That Works on Windows 8

Experts Find Ransomware That Works on Windows 8

Trojan.Ransomlock.U has no problem in locking the screen of computers that run the new OS

Malware Uses Social Media and Blogging Sites as Part of Its C&C Server

Malware Uses Social Media and Blogging Sites as Part of Its C&C Server

FireEye researchers have analyzed an interesting threat

Young Indian Hacker Claims to Have Created Windows Phone 8 Malware

Young Indian Hacker Claims to Have Created Windows Phone 8 Malware

The prototype is capable of stealing all sorts of information

Facebook Chat Can Be Used to Launch DOS Attacks, Expert Finds

Facebook Chat Can Be Used to Launch DOS Attacks, Expert Finds

The exploit code has been made available by the researcher

QRishing Study: Curiosity Is the Largest Motivating Factor for Scanning QR Codes

QRishing Study: Curiosity Is the Largest Motivating Factor for Scanning QR Codes

Carnegie Mellon University researchers have analyzed a particular type of phishing attacks

Cybercrime Investigators Find Adobe Reader X/XI Zero-Day Sold for $50,000 – Video

Cybercrime Investigators Find Adobe Reader X/XI Zero-Day Sold for $50,000 – Video

Currently, the exploit is sold only in closed circles on the black market

Image-Stealing Malware Could Be Upgraded for Sophisticated Attacks

Image-Stealing Malware Could Be Upgraded for Sophisticated Attacks

Sophos and McAfee experts continue to examine the threat

 
Want more? Browse: