Reports have emerged that a substation in Pivnichna in the Ukraine, was fully cut off from the main power grid…
Browsing: Malware and Vulnerabilities
Following the news that a widespread “DNSChanger” attack on vulnerable home networking equipment has been redirecting traffic from afflicted networks, including that…
Independent research commissioned by Veracode highlights improvements made in secure development, as well as areas for future improvements in secure…
A flaw in an in-flight entertainment system used by major airlines including Emirates, Virgin and Qatar could let hackers access…
Following the news that insurance claims for data breaches are being made at a rate of more than one a day, Matt…
Kaspersky Lab experts have discovered a modification of the mobile banking Trojan, Faketoken, which can encrypt user data. Disguised as various programs and games, including Adobe Flash…
Throughout the year, Forcepoint’s researchers been monitoring key milestones in Locky’s evolution; from its birth in February and the addition of virtual machine (VM) and…
What is a faketivist? Faketivist /fāktəvəst/ Noun A fictitious persona created to emulate a hacktivist and act as a public-facing…
Following the launch of Nintendo’s Super Mario Run game, Aaron Lint, VP of Research at Arxan Technologies, commented below on…
Technology advancements have helped us improve our security and safety – think security cameras. It has helped us increase our…