The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.
The recent release of Apple’s iPhone 6 was coupled with the upgrade in software to iOS 8. This new operating system has come with a host of new features including these 5 that will make your phone safer than ever.
APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.
MasterCard and VISA have revealed their plan to end the use of passwords for online payments, reports The Telegraph.
The BadUSB malware which potentially turns any USB stick into a ‘unpatchable’ malware carrier doesn’t quite have the potential for mayhem it was originally feared, according to the researcher who uncovered the exploit.
Microsoft’s .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.
Microsoft has uncovered a flaw in all supported versions of Microsoft Windows that could allow hundreds of millions of computers to be taken over by a remote attacker, International Business Times reports.
Following last month’s leak of 13gb worth of private Snapchat videos, the vanishing message service has announced a new policy whereby it will automatically detect third-party apps, and advise users to disconnect them, reports Tech Crunch.
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
As we’ve reported before, users and businesses leaving their router username and passwords as the manufacturer’s default are potentially leaving themselves open to an easy hack, but a new website has sprung up illustrating the point in alarming detail.
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks — “air-gapped” networks — and exfiltrate sensitive files from them through removable drives.
A new wristband that aims to replace the password has launched a crowdfunding campaign on Kickstarter. At the time of writing, Everykey has passed the halfway mark on its $100,000 funding target with $56,586 pledged with 19 days to reach $100,000. Using Bluetooth, the Everykey promises “immediate access to a user’s password-protected electronics such as
Google has teamed up with the University of California in San Diego to publish surprising new research about phishing, how effective it is and how scammers work their phishing operations.
September’s breach of Home Depot that saw 56 million sets of credit and debit card data stolen was not the only thing lost in the leak, the company has revealed.