Madi Malware: Another Trojan Targets Organizations from the Middle East

Madi Malware: Another Trojan Targets Organizations from the Middle East

Unlike Stuxnet and Flame, Madi relies on social engineering to infect computers

Security Expert “Hacks” Handcuffs Using 3D Printer

Security Expert “Hacks” Handcuffs Using 3D Printer

A German researcher shows everything there is to know about handcuff security

Flaw in Artema Hybrid Terminals Allows Hackers to Collect Payment Card Details

Flaw in Artema Hybrid Terminals Allows Hackers to Collect Payment Card Details

This somewhat controversial discovery might affect a large number of people from Germany

  • Apple
  • By Eduard Kovacs
  • July 17th, 2012
Apple Takes Steps to Mitigate In-App Purchase Flaw

Apple Takes Steps to Mitigate In-App Purchase Flaw

The hacker made some changes to the system to make sure that it’s still operational

  • Apple
  • By Eduard Kovacs
  • July 14th, 2012
Apple’s In-App Purchase System Hacked via Man-in-the-Middle Attack

Apple’s In-App Purchase System Hacked via Man-in-the-Middle Attack

The method can be used to purchase extensions or extra levels for free

Researcher Identifies Critical Vulnerability in Chrome 20 (Video)

Researcher Identifies Critical Vulnerability in Chrome 20 (Video)

Ucha Gobejishvili has published a POC video to demonstrate his findings

Experts Find Intel OS X Binary in Multi-Platform Malware

Experts Find Intel OS X Binary in Multi-Platform Malware

The new variant doesn't need additional software to open a reverse shell

Yahoo! Hack Could Be More Critical than Firm Claims, Expert Says (Exclusive)

Yahoo! Hack Could Be More Critical than Firm Claims, Expert Says (Exclusive)

Janne Ahlberg found some noteworthy clues in the Yahoo! data dump

DarkComet RAT Used to Target Gamers, Military and Governments, Experts Find

DarkComet RAT Used to Target Gamers, Military and Governments, Experts Find

Arbor Networks experts analyzed the most interesting of their 4,000 samples

Experts: Phishing Campaigns Changed Since “Blackhole” Came into the Picture

Experts: Phishing Campaigns Changed Since “Blackhole” Came into the Picture

Trend Micro experts published a detailed paper on spam runs that rely on the exploit kit

Netflix and YouTube HQ Now a Reality as Nexus Q Gets Hacked

Netflix and YouTube HQ Now a Reality as Nexus Q Gets Hacked

A video has been made to show off the endless possibilities

NFC Can Be Used to Steal Files and Take Control of Phones, Expert Says

NFC Can Be Used to Steal Files and Take Control of Phones, Expert Says

Charlie Miller will present his findings at Black Hat USA 2012

Researchers Identify “Invisible” Data Theft at Black Hat USA 2012

Researchers Identify “Invisible” Data Theft at Black Hat USA 2012

Stochastic forensics can be used to determine if data was copied from a computer

Man-in-the-Mobile Attacks Target the Bank Accounts of Android Users

Man-in-the-Mobile Attacks Target the Bank Accounts of Android Users

Individuals from Spain, Portugal, Germany and the Netherlands are potential victims

Android “Botnet” Might Involve Yahoo! Mail Session Hijacking, Experts Say

Android “Botnet” Might Involve Yahoo! Mail Session Hijacking, Experts Say

Lookout researchers present a plausible theory regarding the alleged botnet

US Authorities Spread Fake Secrets to Identify Leakers

US Authorities Spread Fake Secrets to Identify Leakers

The Pentagon wants to make sure that no more information ends up on Wikileaks

Monkif Botnet Avoids Detection by Receiving Commands Encrypted in JPEG Files

Monkif Botnet Avoids Detection by Receiving Commands Encrypted in JPEG Files

McAfee experts have analyzed the threat which seems to use the same server since 2009

 
Want more? Browse: