Yahoo! won’t! fix! emoticon! exploit! in! death! row! Messenger!
Updated Hacker Julien Ahrens says Yahoo! Messenger contains a remote code execution hole that the Purple Palace won't fix. The buffer overflow holes (CVE-2014-7216) will keep bleeding, Ahrens says,...
View ArticleNorth Korea exploits 0-day in Seoul’s favourite word processor
FireEye researchers Genwei Jiang and Josiah Kimble say attackers from North Korea exploited a zero day vulnerability in a word processor popular with the South Korea's government. The attackers went...
View ArticleLock screen flaw found in Android
A security flaw in Android that lets people bypass the lock screen on a mobile device has been discovered by researchers at the University of Texas. They found that trying to unlock the phone or...
View ArticleTwo-week-old WordPress malware attack is blossoming into a real threat
MALWARE DETECTING, preventing and protecting company Sucuri has warned the world about a problem in WordPress that is two weeks into the threat charts already and is rising rapidly. The malware is...
View ArticleApple’s App Store infected with XcodeGhost malware in China
Apple has said it is taking steps to remove malicious code added to a number of apps commonly used on iPhones and iPads in China. It is thought to be the first large-scale attack on Apple's App Store....
View ArticleSecurity wares like Kaspersky AV can make you more vulnerable to attacks
Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows that in some cases, they can open people to hacks they otherwise...
View ArticleGlobal nuclear facilities ‘at risk’ of cyber attack
The risk of a "serious cyber attack" on nuclear power plants around the world is growing, warns a report. The civil nuclear infrastructure in most nations is not well prepared to defend against such...
View ArticleKemoge adware infects users in more than 20 countries
Yet another adware campaign stemming from China has been identified, and in this fresh go, victims' Android devices can be completely taken over. The Kemoge adware family, as FireEye calls it, is...
View ArticlePawn Storm attack: Flash zero-day exploit hits diplomatic inboxes
Hackers behind a long-running cyber-espionage campaign have begun using a new Adobe Flash zero-day exploit in their latest campaign. The attackers behind Pawn Storm targeted several foreign affairs...
View ArticleSecurity bugs in global mobile networks exposed
Mobile networks around the world have been penetrated by criminals and governments via bugs in the code that keeps them running, research suggests. The bugs could be abused to carry out large scale...
View ArticleThe first rule of zero-days is no one talks about zero-days
How do you defend yourself against the unknown? That is crux of the zero-day vulnerability: a software vulnerability that, by definition, is unknown by the user of the software and often its developer...
View ArticleGoogle reveals Samsung Galaxy S6 Edge’s security flaws
Google has highlighted 11 security flaws in Samsung's flagship Android handset, the Galaxy S6 Edge. The vulnerabilities include a loophole that could have been used by hackers to gain control of a...
View ArticleLinux Crypto Ransomware Issue Hits 40,000 Sites
RUSSIAN ANTIVIRUS OUTFIT Dr Web has carried on studying the Linux.Encoder.1 trojan threat and reported some more bad news about increased infection. The firm revealed the problem already, but now it...
View ArticleMore ransomware shenanigans
Recently, an update of the infamous CryptoWall ransomware (or cryptoware) was released - you can read more about that particular ransomwere here: CryptoWall 4.0 released with new Features such as...
View ArticleAnonymous ‘declares war’ on Islamic State
Anonymous is promising its "biggest operation ever" against Islamic State militants (IS). The hacking group's "declared war" against the extremists after the attacks in Paris on Friday. In a YouTube...
View Article