LATEST STORIES

A number of IoT devices are vulnerable due to the Devil’s Ivy flaw

There is a new threat on the horizon, targeting the internet of things (IoT) devices. Experts from Senrio, an IT company, have detected the...

US Department of Justice confirms shutting down AlphaBay

AlphaBay, dubbed the New Silkroad, was the largest Dark Web marketplace. Used to be. On July 4 the site went offline, so that many...

SambaCry vulnerability allows attackers to compromise NAS devices

Samba, an open-source networking software, is under attack (yet again) due to its SambaCry vulnerability. The software provides Windows-based file and print services to...

Body cam recorded cop planting drugs, Baltimore, US

A police body camera recorded an officer planting a packet of white capsules in a soup can, approaching his colleagues, turning on the body...

Newly-discovered Facebook vulnerability could get your account hacked

Facebook seems to have quite an issue with its account recovery vulnerability. James Martindale has detected the vulnerability and posted his thoughts on Medium. The...

CIA contractor’s analyses of overseas malware exposed by Wikileaks

The Vault 7 dump appears inexhaustible: once again, Wikileaks reveals a new bunch of documents. Today, the whistleblower website has published five reports made...

Fake Tor Browser has no encryption at all, con trick alleged

Two weeks ago, Lawrence Abrams, the owner of BleepingComputer, found a fake Tor Browser called Rodeo Browser positioned as a tool built to ease...

Ashley Madison will pay $11,2 million to the victims of the data breach

After Ashley Madison, an American adultery website, was hacked, millions of users were affected, having all of their sensitive data exposed. According to the...

Critical flaw in Cisco WebEx extension fixed

If you use WebEx extension for Firefox or Chrome running on Windows, you may be vulnerable to a remote code execution attack: visiting a...

Home security system vulnerable to a handful of attacks

iSmartAlarm manufactures miscellaneous security appliances such as door and motion sensors, locks, cameras, alarms, and central controllers (dubbed the Cube). All of them are...

LeakerLocker targets Android users, stealing their sensitive data

A number of ransomware attacks, including Petya and WannaCry, have been spreading fear all over the globe for quite a while now. Unfortunately, a...

Carders used infra-red skimmers to soak victims

While insert skimmers have been spoken about for over a decade, only now they are posing a considerable threat to cardholders. According to Brian...

Highrise: the CIA’s mobile app redirecting SMS texts from infected devices

Highrise can’t be described as malware: deliberately installed by a CIA operative on their own device, it does exactly what is expected. The apps function...

There’s been no scam: AlphaBay was shut down by police

On July 4, AlphaBay Market went offline without explanations, causing a lot of it’s users to suspect a fraud as they saw the website’s...

MacOS malware drains victims’ pockets by mimicking banking websites

Since being discovered, OSX/Dok malware has been growing fast. The latest version of the malware enabled attackers to obtain victim’s financial credentials by imitating...