Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam - but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.
A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information - without using hardware such as USB keys.
Gamers on the popular Steam gaming service have been targeted with phishing scams via the service’s popular Marketplace - with apparent ‘bargains’ offering a sting in the tail.
The BadUSB malware which potentially turns any USB stick into a 'unpatchable' malware carrier doesn't quite have the potential for mayhem it was originally feared, according to the researcher who uncovered the exploit.
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- “air-gapped” networks -- and exfiltrate sensitive files from them through removable drives.
A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
City University professor Dr David Stupples and a team of researchers are looking into ways of minimizing the risk of hacking planes in the future.
A carder like tool for cybercriminals that promises to use stolen credit card details in a more 'human way' to bypass fraud detection has been found on sale for as little as $180, according to The Register.
A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as "the command and control to steal data."
IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?
An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this "would not prevent copycat attackers from the more than 100 exit nodes in operation."
An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
Cybercriminals taking advantage of a 'malvertising' attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Stationary and office supply store Staples is the latest company to be dealing with a credit and debit card breach, according to Brian Krebs at Krebs on Security.
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Malware has come a long way since its earliest days, and aided by the rapid development of the internet it's certainly faster spreading than the weeks it took in the days of floppy disk transfer.
Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.
Sears Holding Co. is the latest high profile name to announce the discovery of malicious credit and debit card stealing malware in its point of sale registers at its Kmart stores, writes Brian Krebs on his Krebs on Security website.