Researcher Patrick Wardle will demonstrate a Mac OS X Gatekeeper bypass that exploits a weakness in the Apple OS that allows signed apps to execute malicious code.
Browsing Category: Malware
The Dyreza, or Dyre, Trojan has been spotted phishing credentials in attacks against the IT supply chain.
Researchers with Google and a handful of universities believe security practitioners need to focus on evaluating how cybercriminals adapt to interventions instead of trying to protect users.
Microsoft revoked the four digital certificates inadvertently leaked last week by networking gear manufacturer D-Link.
As China president Xi Jinping visits the U.S., a new report surfaces tying cyberespionage activities against U.S. interests in the South China Sea to China’s PLA Unit 78020.
Researchers found a weakness in XcodeGhost that puts it at risk for man-in-the-middle attacks.
iOS apps infected with the XcodeGhost malware have been removed from the App Store and three command domains communicating with infected apps have been shut down.
Exploit vendor Zerodium will host a month-long million-dollar bug bounty focused on Apple iOS 9.
Private keys used to sign D-Link software were included in open-source firmware published by the company.
Ransomware has emerged as major threat to consumers and businesses in recent years, and law enforcement agencies and security researchers have taken note. Authorities last year disrupted the Cryptolocker ransomware operation and now Dutch police have arrested two young men they believe are involved in the CoinVault ransomware. The arrests came Monday in the Netherlands[…]