UPDATE: Thousands of U.S. gas stations contain internet-connected fuel gauges that don’t require passwords and could be remotely shut down by hackers.
Browsing Category: Uncategorized
The head of the Federal Trade Commissioned warned of a future where data collection has gone awry and avoid it at the Consumer Electronics Show.
A new year begins at midnight and Threatpost highlights seven things you’re bound to contend with in 2015.
Up to 100,000 sites hosted on WordPress may be vulnerable to new campaign that’s pushing malware and multiple exploit kits to the browser.
Mozilla issued nine security updates for exploitable vulnerabilities in Firefox, Firefox extended support release and its Thunderbird email client.
The FTC and a Florida federal court issued temporary restraining orders against a number of organizations and individuals involved in a massive telemarketing operating selling bogus software and support.
Researchers have identified a group that’s been operating in Asia for at least seven years and has been using hotel networks as key infection points to target top executives at companies in manufacturing, defense, investment capital, private equity, automotive and other industries.
Home Depot revealed that hackers used credentials stolen from a third-party vendor to steal 53 million email addresses in addition to 56 million payment card numbers.
Researchers at Palo Alto Networks discovered a new family of Mac OS X malware that was capable of also infecting iOS devices. The command infrastructure supporting WireLurker has been shut down.
Researchers have developed malware called AirHopper that decodes radio frequencies emitted from a computer monitor, video card or cable, in order to steal data from an air-gapped machine.