Menu

Latest articles

DSA-3655 mupdf
SpyNote Trojan (RAT); Yet Another Bad News for Android Users
DSA-3653 flex
DSA-3652 imagemagick
DSA-3651 rails
Threat Recap: Week of August 22nd
Pacemaker Hacking Fears Rise With Critical Research Report
Debian: 3654-1: quagga: Summary
Debian: 3653-1: flex: Summary
Debian: 3652-1: imagemagick: Summary
Debian: 3651-1: rails: Summary
Update iPhone to iOS 9.3.5; Prevent this Highly Sophisticated Spyware
Future iPhones might grab a thief’s photo and fingerprint when stolen
Mozilla launches free website security scanning service
After iOS, Opera’s Free VPN App is Available for Android Devices
Threatpost News Wrap, August 26, 2016
How to opt out of WhatsApp sharing your phone number with Facebook
21st century cybercriminals: The threat landscape has evolved
Real-life examples test whether you are prepared for a cyberattack
Apple patches iOS security flaws found in spyware targeting activist
Hackers insert malware onto Thai ATMs, steal 12 million baht
Cisco starts patching firewall devices against NSA-linked exploit
Don’t bring your bad security habits to the cloud
Muddying the waters of infosec: Cyber upstart, investors short medical biz – then reveal bugs
HP Laptops Block Unwelcome Snoopers
Apple iOS users, update now – zero-day attack seen in the wild
Ransom.Tearhide
Ransom.Fantom
Trojan.Snifula!gm
DSA-3654 quagga
Anatomy of a cryptographic collision – the “Sweet32” attack
IoT manufacturer caught fixing security holes
Emergency iOS Update Patches Zero Days Used by Government Spyware
WhatsApp to share user data including phone numbers with Facebook
France, Germany Call for European Decryption Law
Update your iPhones, iPads right now – govt spy tools exploit vulns
Keystroke Recognition Uses Wi-Fi Signals To Snoop
Red Hat: 2016:1763-01: qemu-kvm-rhev: Moderate Advisory
Russia’s Mail.ru Hacked Again; 27 million Accounts Stolen
Ghostbusters star’s website defaced with racist and explicit images
VMware Patches Flaws in Identity and Cloud Products
Tor Update Fixes ReachableAddresses Problem
A quarter of banks’ data breaches are down to lost phones and laptops
Mr. Robot eps2.6succ3ss0r.p12 – the security review
7 Database Security Best Practices
Wildfire ransomware code cracked: Victims can now unlock encrypted files for free
Google to rate down sites with aggravating pop-up ads
New collision attacks against triple-DES, Blowfish break HTTPS sessions
The catch-22 with Apple security
Practical steps for strengthening your company’s password rules