admin

0 Comments
The Logitech Options app, which configures the company’s mice and keyboards in Windows, relies on an ineffective authentication mechanism that enables malicious webpages to execute code on a victim’s machine. Tavis Ormandy, vulnerability researcher with Google’s Project Zero, found the flaw in the Logitech Options app when he tried to rebind a button on his
0 Comments
The Cyber Security Gurukul Series is an initiative by the ‘Women Wizards Rule Tech (W2RT)’, a unique program designed exclusively for Women professionals in Core Technologies by noted industry body NASSCOM. Focused specifically on the IT-ITES/BPM, Product and R&D Firms, the key aim of this initiative is to enable women with deeper knowledge various technologies
0 Comments
An interview with ESET researchers Tomáš Gardoň and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government In a presentation at AVAR 2018, ESET’s Tomáš Gardoň and Filip Kafka uncovered their research of a previously undocumented espionage toolkit, used in targeted attacks against the Malaysian government in mid-2018.
0 Comments
Earlier this year, Apple Music launched some of its top charts as playlist series. Today, YouTube is doing something similar. The company announced it’s making its YouTube Charts available as playlists in YouTube Music to users across the 29 markets where the music service is live. Each market will receive five of these “charts playlists” –
0 Comments
Over 40,000 credentials for accounts on government portals around the world have been leaked online, and are most likely up for sale on the dark web. Russian security firm Group-IB said usernames and cleartext passwords were available for various local and national government entities across more than 30 countries. It’s not clear exactly how they
0 Comments
This post was written with contributions from the McAfee Advanced Threat Research team.   The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting nuclear, defense, energy, and financial companies, based on McAfee® Global Threat Intelligence. This campaign, Operation Sharpshooter, leverages an in-memory implant to download
0 Comments
Nearly five years after announcing its acquisition of OculusVR, Facebook is finally ready to put the drama surrounding its founding behind it. Gaming giant ZeniMax Media’s lawsuit against Facebook over the misuse of intellectual property related to the founding of OculusVR has finally been settled. In a statement, ZeniMax CEO Robert Altman confirmed the settlement
0 Comments
The coming year will see a mix of old and new as phishing is supercharged with AI but reported vulnerabilities continue to cause organizations problems, according to Trend Micro. The security giant claimed in its predictions report this week that phishing will continue to grow in popularity as exploit kits fade. The number of detections
0 Comments
by John E Dunn What’s the safest way for a criminal to buy counterfeit banknotes? Curiously, it’s not necessarily from the dark web, as 235 people now “detained” by police have just discovered. According to Europol, between 19 November and 3 December police forces in 13 countries searched 300 properties, uncovering caches of drugs, guns
0 Comments
“Profit is sweet, even if it comes from deception,” the playwright Sophocles wrote. Over two millennia later, the ancient Greek’s words still ring true. Or perhaps they need just a tweak — because now those “sweet” profits come because of deception. Deception technologies, that is. The market for deception security tech is expected to boom
0 Comments
The NHS will be banned from buying any more fax machines from next month as the government looks to upgrade the health service to more modern and secure communications platforms. Health secretary Matt Hancock has also ordered a complete ban on their use by March 2020, as part of a plan to bring the NHS into
0 Comments
by Danny Bradbury WordPress users are facing another security worry following the discovery of a massive botnet. Attackers have infected 20,000 WordPress sites by brute-forcing administrator usernames and passwords. They are then using those sites to infect even more WordPress installations. The botnet, which WordPress security company Wordfence discovered last week, infects sites using a
0 Comments
Your home screen is just a matrix of numbers. Your device loses its charge quickly, or restarts suddenly. Or, you notice outgoing calls that you never dialed. Chances are your smartphone has been hacked. The sad truth is that hackers now have a multitude of ways to get into your phone, without ever touching it.
0 Comments
You’d think Facebook would be faster at copying itself. Five years after Facebook Messenger took a cue from WhatsApp and Voxer to launch voice messaging, and four months after TechCrunch reported Instagram was testing its own walkie talkie feature, voice messaging is rolling out globally on Instagram Direct today. Users can hold down the microphone