The CIA is planting web beacons inside Microsoft Word documents to track whistleblowers, journalists and informants, according to WikiLeaks.
Browsing Author: Tom Spring
Verizon’s Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage.
As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.
The Hack the Air Force bug bounty program invites white hats from inside and outside the U.S. to hack its websites.
A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online.
Nearly two-thirds of servers and PCs peddled on the xDedic underground marketplace belong to schools and universities based in United States.
Researchers say fileless in-memory malware attacks have become a major nuisance to businesses and have become even harder to detect and defend.
Brazilian cybercriminals are using the original version of the XPan ransomware, targeting small to medium-sized business based in Brazil with the malware.
The first large scale Locky campaign in months has been detected via the Necurs botnet.
An Android app that falsely claimed to be a tool for keeping smartphones up-to-date with the latest version of the OS was found surreptitiously tracking the physical location of it users using spyware called SMSVova.