Nemesis, a bootkit used to steal payment card dataNemesis, a bootkit used to steal payment card data

Nemesis, a bootkit used to steal payment card data

10 years ago

Nemesis is a new strain of malware, very hard to detect and remove, designed to steal payment card data and…

BackStab Malware steals iOS and BlackBerry BackupsBackStab Malware steals iOS and BlackBerry Backups

BackStab Malware steals iOS and BlackBerry Backups

10 years ago

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data…

Security Affairs newsletter Round 38 – Best of the week from best sourcesSecurity Affairs newsletter Round 38 – Best of the week from best sources

Security Affairs newsletter Round 38 – Best of the week from best sources

10 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

Critical vulnerabilities found in Honeywell Midas Gas DetectorsCritical vulnerabilities found in Honeywell Midas Gas Detectors

Critical vulnerabilities found in Honeywell Midas Gas Detectors

10 years ago

Another vulnerable IoT device is in the headlines, this time two serious vulnerabilities affect the Honeywell Midas gas detectors. Honeywell…

The French Gov wants to Block Tor and Forbid Free Wi-FiThe French Gov wants to Block Tor and Forbid Free Wi-Fi

The French Gov wants to Block Tor and Forbid Free Wi-Fi

10 years ago

In response to the recent Paris terror attacks, the French government is proposing to forbid and block the use of…

ISIS members have developed a mobile app for its communicationsISIS members have developed a mobile app for its communications

ISIS members have developed a mobile app for its communications

10 years ago

Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications.…

3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

10 years ago

Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC…

ISIS recruited experts set to wage chemical and biological attacksISIS recruited experts set to wage chemical and biological attacks

ISIS recruited experts set to wage chemical and biological attacks

10 years ago

A European Parliament report has warned that the ISIS organization has already smuggled CBRN material into the EU, the risk…

Cyber spies of the Sofacy APT increased its operations tenfoldCyber spies of the Sofacy APT increased its operations tenfold

Cyber spies of the Sofacy APT increased its operations tenfold

10 years ago

According to a new report published by the Kaspersky Lab, the Sofacy APT has recently increased its activities. According to…

EFF Scoreboard – Secure Messaging, stay safe onlineEFF Scoreboard – Secure Messaging, stay safe online

EFF Scoreboard – Secure Messaging, stay safe online

10 years ago

Learn more about the EFF scoreboard for secure, encrypted communication options online and what the future holds. Online communications have…