In what’s sure to take the cake as “largest heist in the history of modern commerce”, members of the research team at Kaspersky Lab have announced they had uncovered a massive operation undertaken by some of the world’s most sophisticated hacking rings, which netted everyone involved just over $1 billion by the time all was Read More
British Prime Minister David Cameron has come under fire for promising to ban encrypted and ephemeral messaging apps if he is re-elected later this year. His comments came just a few days after the Paris terrorist attacks.
Google has blacklisted over 11,000 WordPress based websites that were infected by a Russian malware named SoakSoak, which redirects users to shady links that download harmful payloads to their systems.
US Senator Ron Wyden has introduced a new bill that bans the government from planting backdoors into US tech electronics and software. The ‘Secure Data Act’ is aimed to protect data security and privacy of all US citizens.
Hackers are taking advantage of new malware called Dare Devil (stylized as “d4re|dev1|”) created to steal financial payment card data from PoS terminals and also attack electronic kiosks and vending systems.
Just before everyone headed home for Thanksgiving break last week, researchers at the Netherlands-based digital forensics lab Fox IT posted a whitepaper which detailed the results of their investigation into a bug that could affect over 23,000 websites that use the WordPress, Joomla, and Drupal publication platforms to host their own content.
Over the weekend, the Internet and Twittersphere was abuzz with rumors and information about a new malware program, known as Regin, that was first made public by the threat research group at Symantec. Since hitting the wires, there has been a flurry of speculation as to whether or not the malware was state-sponsored or the Read More
Details have emerged on Twitter regarding a new exploit for OSX Yosemite that gives hackers the ability to escalate administrative privileges on a compromised machine, and bypass the usual safeguards which are supposed to place a stop on anyone who tries to root the OS through a temporary backdoor. First discovered by Swedish penetration tester Read More
Apple have injected an interesting tidbit of information in their “About Spotlight & Privacy” terms of service for the release of their newest iteration of OSX, dubbed Yosemite, which details the way the Spotlight app carefully tracks both the content of your searches, as well as the location you were in when you made the Read More
This week, a little-known upstart company Anonabox posted a Kickstarter for a new product that would make the process of signing onto the Tor anonymization protocol on your home network easier and more streamlined than ever before. Hoping to raise $7,500 in 30 days, the company’s expectations were shattered when over $600,000 poured into their Read More