Breaking News

A simulation shows how a ransomware could hack PLCs in a water treatment plantA simulation shows how a ransomware could hack PLCs in a water treatment plant

A simulation shows how a ransomware could hack PLCs in a water treatment plant

The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment…

8 years ago
Experts warn of the rapid growth of the Marcher Android banking TrojanExperts warn of the rapid growth of the Marcher Android banking Trojan

Experts warn of the rapid growth of the Marcher Android banking Trojan

Malware researchers at the security firm Securify have published a detailed analysis of the Marcher Android banking Trojan. Security experts…

8 years ago
Office Loader leverages malicious macros to deliver multiple malwareOffice Loader leverages malicious macros to deliver multiple malware

Office Loader leverages malicious macros to deliver multiple malware

Security researchers at Palo Alto Networks spotted a campaign leveraging Microsoft Office loader using malicious macros to drop multiple malware…

8 years ago
National Cyber Security Centre – UK hit by dozens of major cyber attacks each monthNational Cyber Security Centre – UK hit by dozens of major cyber attacks each month

National Cyber Security Centre – UK hit by dozens of major cyber attacks each month

Britain's security has been threatened by 188 major cyber attacks in the last three months, according to the head of…

8 years ago
Watering hole attacks on Polish Banks Linked to Lazarus GroupWatering hole attacks on Polish Banks Linked to Lazarus Group

Watering hole attacks on Polish Banks Linked to Lazarus Group

According to security experts from Symantec and BAE Systems, the recently discovered attacks aimed at Poland banks are linked to…

8 years ago
Word documents laced with malicious macros used to hack Apple Mac systemsWord documents laced with malicious macros used to hack Apple Mac systems

Word documents laced with malicious macros used to hack Apple Mac systems

Crooks exploiting Word documents laced with malicious macros to compromise Apple Mac systems exactly in the same way they do…

8 years ago
Search engine companies will ban links published by major torrent hubsSearch engine companies will ban links published by major torrent hubs

Search engine companies will ban links published by major torrent hubs

Starting from June 1st search engine companies will block queries to links to pirated content, including films, TV shows, and…

8 years ago
A new serious DOS flaw affects BIND DNS software, updates it nowA new serious DOS flaw affects BIND DNS software, updates it now

A new serious DOS flaw affects BIND DNS software, updates it now

A new serious denial-of-service (DoS) vulnerability was patched this week by the Internet Systems Consortium (ISC) in the BIND DNS…

8 years ago
Security Affairs newsletter Round 99 – News of the weekSecurity Affairs newsletter Round 99 – News of the week

Security Affairs newsletter Round 99 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

8 years ago
A US minor is behind the cyber attack that hit Brussels airport after bombingsA US minor is behind the cyber attack that hit Brussels airport after bombings

A US minor is behind the cyber attack that hit Brussels airport after bombings

Prosecutors confirmed that the failed cyber attack on Brussels airport a few hours after 2016 bombings was launched by a…

8 years ago