Malware & Vulnerabilities

Malware and vulnerabilities news, trends, analysis and practical advice

security hacker
hardware security embedded circuit board integrated controller

hacking

Schneier: Next president may face IoT cyberattack that causes people to die

With IoT and cyber-physical systems becoming the new normal, respected security guru Bruce Schneier suggested the next president may face 'a large-scale internet disaster that kills multiple people.'

20151027 openworld dell sign

Dell patches critical flaws in SonicWALL Global Management System

Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways.

rio olympics tickets

With hackers targeting Rio Olympics, watch out for these cyberthreats

The Olympics in Rio de Janeiro will attract more than just athletes and tourists this year -- hackers from across the world will also be on the prowl, trying to exploit the international event.

20151027 openworld oracle cloud signs

Oracle issues largest patch bundle ever, fixing 276 security flaws

Oracle has released a new batch of security updates for over 80 products from its software portfolio to fix 276 vulnerabilities.

fraud infog primary

Feds shut down tech support scammers, freeze assets

Federal authorities have shut down several alleged tech support scammers working out of Florida, Iowa, Nevada and Canada, freezing their assets and seizing control of their businesses.

webcam spying

Delilah malware secretly taps webcam, blackmails and recruits insider threat victims

Delilah malware taps computer and webcam to get dirty little secrets, then blackmails victims into becoming an insider threat and coughing up a company’s secrets.

pokemon go 22

Fake Pokemon Go game locks phone, secretly drives porn ad clicks

A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads.

banking

This Android Trojan blocks the victim from alerting banks

A new Trojan that can steal your payment data will also try to stymie you from alerting your bank.

banking

This Android Trojan blocks the victim from alerting banks

A new Trojan that can steal your payment data will also try to stymie you from alerting your bank.

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fall-back mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

microsoft headquarters

Microsoft fixes critical flaws in IE, Edge, Office and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.

google to collaborate with fca to integrate self driving technology

Fiat Chrysler launches bug bounty program for connected vehicles

Fiat Chrysler Automobiles has launched a bug bounty program to attract white-hat hackers to spot cybersecurity flaws in its products and connected services.

malware infection cyberattack

Stealthy cyberespionage malware targets energy companies

Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies.

omni hotelsresorts stckd blk

Omni Hotels was hit by point-of-sale malware

Omni Hotels & Resorts has reported that point-of-sale systems at some of its properties were hit by malware targeting payment card information.

wendys restaurant

Wendy's hack was bigger than thought and exposed credit card data

A data breach that hit Wendy's fast food restaurants targeted customer credit card information and was more than three times bigger than originally disclosed.

OS X El Capitan installation

New Mac backdoor program steals keychain contents

Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS encrypted keychain and give attackers control over the system.

ok google

Here's how secret voice commands could hijack your smartphone

Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it.

malware infection cyberattack

New Tor-powered backdoor program targets Macs

Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network.

Load More