Researchers find that 17 of 140 major online services are vulnerable to SIM swapping attacks.
Two Citrix bug (CVE-2019-19781) exploits have been published on GitHub yesterday, making future attacks trivial for most hackers.
A Croatian recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
Cable modems using Broadcom chips are vulnerable to a new vulnerability named Cable Haunt, researchers say.
Special Services Group, a company that sells surveillance tools to the FBI, DEA, ICE, and other US government agencies, has had its secret sales brochure published. Motherboard received the brochure as part of a FOIA request to the Irvine Police Department in California. "The Tombstone Cam is our newest video concealment offering the ability to conduct remote surveillance operations from...
PowerTrick is reserved for the most lucrative targets on the gang’s hit list.
Information leaked due to data breaches was used to file fraudulent tax returns.
As a new year unfolds, so do portfolio changes and acquisition deals in the cybersecurity sector.
Google says it removed more than 1,700 Android apps infected with Bread (Joker) malware since 2017.
Privacy organizations ask Google to introduce new OEM rules for Android bloatware.
Malwarebytes said it found malware pre-installed on Unimax U673c handsets, sold by Assurance Wireless (Virgin Mobile) in the US.
At least 80,000 organizations could be at risk.
The ransomware attack has infuriated stranded customers and the ICO has still not seen an official data breach report.
Security breach took place on January 8, but the city said it detected the intrusion in time to prevent any damage.
Saudi Arabia's cyber-security agency spots new Dustman data-wiping malware.
Interpol and CERT teams from 10 Southeast Asian countries crack down on hacked MikroTik routers.
Chinese security firm claims there's also an accompanying Internet Explorer zero-day.
There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions attack against SHA-1: on an Nvidia GTX 970, identical-prefix collisions can now be computed with a complexity of 261.2rather than264.7,...
No cryptocurrency wallet will be integrated with Telegram Messenger either -- at least, not yet.
ATM users had their cards read and bank accounts pillaged.