News

Did You Install Super Mario Run APK for Android? That’s Malware

After the success of Pokémon Go, Nintendo's "Super Mario Run" has become the hottest game to hit the market with enormous popularity and massive social impact. The game has taken the world by storm since its launch for iOS devices over a week ago. Can you believe — it was downloaded more than 40 million times worldwide in its first four days of release. But if you have downloaded a S...
Read More

Another Massive DDoS Closes Out 2016, But Mirai Not To Blame

  Using a new malware variant called Leet, the 650 Gbps DDoS attack matched Mirai's floods of traffic. This past year has been one for the record books when it comes to distributed denial of service (DDoS) attacks, so it is only proper that 2016 closes out with news of another massive DDoS attack, reported by Imperva researchers. According to them, the Imperva Incapsula network was forced...
Read More

Nine Ways to Protect an IT System Against Ransomware

Unlike the stealthier advanced attacks that can stay undetected on corporate network for months, the impact of ransomware is immediate and intrusive. Ransomware infiltrations in enterprises increased by 35 percent in 2016, according to consensus of security industry analysts. But even more alarming is the recent rise in its sophistication and distribution.Ransomware is a type of malware that ...
Read More

Police Ask for Amazon Echo Data to Help Solve a Murder Case

  Hey, Alexa! Who did this murder? Arkansas police are seeking help from e-commerce giant Amazon for data that may have been recorded on its Echo device belonging to a suspect in a murder case, bringing the conflict into the realm of the Internet of Things. Amazon Echo is a voice-activated smart home speaker capable of controlling several smart devices by integrating it with ...
Read More
Posted in Uncategorized Tagged

“Switcher” Android Trojan Hacks Routers, Hijacks Traffic

  Researchers at Kaspersky Lab have come across a new Android Trojan that hacks routers and changes their DNS settings in an effort to redirect traffic to malicious websites. Dubbed “Switcher,” the malware has been disguised as an Android client for the Chinese search engine Baidu, and a Chinese app for sharing Wi-Fi network details. Once users install one of these apps, the malware att...
Read More

Fileless Malware Takes 2016 By Storm

  In-memory attacks are all the rage, creating a growing class of "non-malware." Malware creators have spent a lot of energy over the years obfuscating the malicious files they drop on infected systems to stay one step ahead of detection mechanisms. This year they're taking their efforts to a new level by dispensing with dropped files altogether. According to security researchers, 2016 sa...
Read More

PHPMailer Bug Leaves Millions of Websites Open to Attack

A critical PHPMailer bug tied to the way websites handle email and feedback forms is leaving millions of websites hosted on popular web-publishing platforms such as WordPress, Drupal and Joomla open to attack. The flaw was disclosed by researcher Dawid Golunski of Legal Hackers, who said the vulnerability could be used by an unauthenticated remote attackers to achieve remote arbitrary code exec...
Read More

Google Test Suite Checks Open Source Cryptographic Library Security

Google's new Project Wycheproof will let software engineers look for previously known flaws in their open source cryptographic libraries. Google has released a set of tests that developers can use to check some open source cryptographic libraries for known security vulnerabilities.The company has named the set of tests Project Wycheproof, after a mountain in Australia, which has the distincti...
Read More

ShadowBrokers Dump Came from Internal Code Repository, Insider

An analysis of the latest ShadowBrokers dump of alleged NSA spy tools points to an insider with access to a code repository belonging to the intelligence agency, experts said. Researchers at security company Flashpoint said today that its investigation of the leaked data points away from an attack against NSA infrastructure, or other theories that operators mistakenly left classified data on st...
Read More

Inside LeakedSource and Its Database of 3 Billion Hacked Accounts

By now it’s hard to keep track of which companies have been hacked and which haven’t. Remember the FourSquare hack? What about Adobe? Even breaches that were high-profile at the time are fading into obscurity as bigger and scarier ones crop up. (Ahem, Yahoo.) And if you can’t remember what’s been hacked, you’re probably struggling to keep track of which leaks have included your personal data. That...
Read More
Top